Get my own profile
Public access
View all15 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Luca VerderameUniversità degli Studi di GenovaVerified email at unige.it
Gabriele CostaIMT LuccaVerified email at imtlucca.it
Meriem GuerarUniversity of Genova, ItalyVerified email at unige.it
Luca CaviglioneSenior Researcher at National Research Council of ItalyVerified email at ge.imati.cnr.it
Francesco PALMIERIUniversity of Salerno, Department of Computer ScienceVerified email at unisa.it
Simone AonzoEURECOMVerified email at eurecom.fr
Davide CaputoHorizon Security - Senior Cyber Security Consultant, PhDVerified email at horizonconsulting.com
Andrea RomdhanaSoftware Engineer at QSA Tech, PhDVerified email at qsatech.com
sherenaz al haj baddarAssociate Professor of Computer Science, University of JordanVerified email at ju.edu.jo
Daniele D'AgostinoUniversità degli studi di GenovaVerified email at unige.it
Angelo CoranaSenior Research Associate (formerly Director of Research), CNR - IEIIT, Genoa (Italy)Verified email at ieiit.cnr.it
Maurizio AielloSenior Technologist, National Research Council of ItalyVerified email at cnr.it
Gianluca PapaleoConsiglio Nazionale delle RicercheVerified email at ieiit.cnr.it
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Mauro CoccoliAssistant Professor, University of GenoaVerified email at unige.it
Andrea RanieriCNR-IMATIVerified email at cnr.it
Mohamed BENMOHAMMEDDepartment of Software Technologies and Information Systems Faculty of New Technologies ofVerified email at univ-constantine2.dz
Yanick FratantonioSenior Research Scientist, GoogleVerified email at fratantonio.me
Mauro MigliardiAssociate Professor of Computer Engineering, University of PadovaVerified email at unipd.it