Get my own profile
Co-authors
Eda MarchettiISTI-CNRVerified email at isti.cnr.it
Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
Said DaoudaghUniversity of Pisa, CNR - ISTIVerified email at isti.cnr.it
Francesca MartelliIstituto di Informatica e Telematica (CNR)Verified email at iit.cnr.it
Antonello CalabròISTI CNRVerified email at isti.cnr.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Antinisca Di MarcoUniversità degli Studi di L'AquilaVerified email at univaq.it
Tejeddine Mouelhiresearcher in Software EngineeringVerified email at uni.lu
Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Yves Le TraonProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Gaetano GiuntaFull Professor of Telecommunications, University of Roma Tre, Chair of Digital Signal ProcessingVerified email at uniroma3.it
Donia EL KATEBuniversity of LuxembourgVerified email at uni.lu
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Claudio PompilioPh.D. Student in Computer Science at University of L'AquilaVerified email at graduate.univaq.it
Denitsa ManovaStudent, SU "Kliment Ohridski"Verified email at uni-sofia.bg
Mike PapadakisResearch Scientist, University of LuxembourgVerified email at uni.lu
G. LamiCNRVerified email at isti.cnr.it
