Get my own profile
Public access
View all39 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Paola InverardiProfessor of Computer ScienceVerified email at univaq.it
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Raffaela MirandolaFull Professor, Politecnico di MilanoVerified email at polimi.it
Henry MucciniFull Professor in Computer Science, University of L'AquilaVerified email at univaq.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Hong ZhuOxford Brookes UniversityVerified email at brookes.ac.uk
Massimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
Stefania GnesiISTI-CNR, ItalyVerified email at isti.cnr.it
Antinisca Di MarcoAssociate Professor at Universitŕ degli Studi di L'AquilaVerified email at univaq.it
Stefano RussoProfessor of Computer Engineering, Universitŕ di Napoli Federico IIVerified email at unina.it
Marco AutiliProfessore Associato, Universitŕ dell'AquilaVerified email at univaq.it
Roberto PietrantuonoUniversity of Naples Federico IIVerified email at unina.it
Emilio CrucianiPostdoctoral Researcher, Paris-Lodron University of SalzburgVerified email at sbg.ac.at
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Roberto VerdecchiaAssistant Professor, University of FlorenceVerified email at unifi.it
Miguel Angel OliveroLSI-USVerified email at us.es
Francisco GortázarUniversidad Rey Juan CarlosVerified email at urjc.es