Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Maurizio TesconiHead of Cyber Intelligence Lab - IIT - CNRVerified email at iit.cnr.it
Roberto Di PietroACM Distinguished Scientist; Full Professor of Cybersecurity, HBKU-College of ScienceVerified email at hbku.edu.qa
Marco AvvenutiDip. Ingegneria dell'Informazione, University of Pisa, ItalyVerified email at iet.unipi.it
Marinella PetrocchiIIT-CNR, Pisa, ItalyVerified email at iit.cnr.it
Serena TardelliIIT-CNR, Italy - Dept. of Information Engineering, University of PisaVerified email at phd.unipi.it
Felice Dell'OrlettaResearcher in Computational Linguistics, ItaliaNLP Lab @ ILC CNR PisaVerified email at ilc.cnr.it
Leonardo NizzoliPhD Student at University of Pisa, Information Engineering Department - Collaboration with IIT-CNRVerified email at iit.cnr.it
Walter QuattrociocchiSapienza University of RomeVerified email at uniroma1.it
Mario Giovanni Cosimo Antonio CiminoAssociate Professor, Department of Information EngineeringVerified email at unipi.it
Fabrizio FalchiISTI-CNR, PisaVerified email at isti.cnr.it
Giovanni Da San MartinoSenion Assistant Professor, University of Padova, ItalyVerified email at math.unipd.it
Preslav NakovPrincipal Scientist, Qatar Computing Research Institute (QCRI), HBKUVerified email at hbku.edu.qa
Emilio FerraraAssociate Professor of Communication, Computer Science, and Preventive Medicine at USCVerified email at usc.edu
Marcelo MendozaAssociate Professor, Universidad Técnica Federico Santa María, CCTVAL and IMFDVerified email at usm.cl