Get my own profile
Public access
View all49 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Paola InverardiProfessor of computer science, Gran Sasso Science InstituteVerified email at gssi.it
Antonello CalabròISTI CNRVerified email at isti.cnr.it
Henry MucciniFull Professor in Computer Science, FrAmeLab, University of L'AquilaVerified email at univaq.it
Raffaela MirandolaFull Professor, Karlsruhe Institute of TechnologyVerified email at kit.edu
Antonino SabettaSAP Security ResearchVerified email at sap.com
Hong ZhuOxford Brookes UniversityVerified email at brookes.ac.uk
Stefania GnesiISTI-CNR, ItalyVerified email at isti.cnr.it
Jesús MoránUniversidad de OviedoVerified email at uniovi.esMassimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Stefano RussoProfessor of Computer Engineering, Università di Napoli Federico IIVerified email at unina.it
Javier TuyaUniversity of OviedoVerified email at uniovi.es
Claudio de la RivaProfessor of Computer Science, University of OviedoVerified email at uniovi.esAntinisca Di MarcoAssociate Professor at Università degli Studi di L'AquilaVerified email at univaq.it
Roberto PietrantuonoUniversity of Naples Federico IIVerified email at unina.itPatrizio PelliccioneDirector of the CS area and Prof. in Software Engineering at Gran Sasso Science Institute (GSSI)Verified email at gssi.it