Get my own profile
Public access
View all18 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Fabio MartinelliConsiglio Nazionale delle RicercheVerified email at iit.cnr.it
Andrea SaracinoIstituto di Informatica e Telematica, Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Antonio La MarraSecurity ForgeVerified email at security-forge.com
Tawbi NadiaUniversité LavalVerified email at ift.ulaval.ca
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
Vahideh MoghtadaieeElectrical Engineering and TelecommunicationVerified email at sbu.ac.ir
Francesco MercaldoUniversity of Molise, Campobasso, ItalyVerified email at unimol.it
Giacomo GiorgiIstituto di Informatica e Telematica, Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Hassan HaghighiShahid Beheshti UniversityVerified email at sbu.ac.ir
Hojjat NavidanPhD Student at IDLab (Ghent University, imec)Verified email at ugent.be
Amir FathalizadehCyberspace Research Institute, Shahid Beheshti UniversityVerified email at mail.sbu.ac.ir
Zekeriya ErkinAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Gamze TillemPhD Candidate, Delft University of TechnologyVerified email at tudelft.nl
Jelle VosDelft University of TechnologyVerified email at tudelft.nl
Milan Lopuhaä-ZwakenbergUniversitair docent, Universiteit TwenteVerified email at utwente.nl
Marco LoogRadboud UniversityVerified email at ru.nl
Majid NateghizadVerified email at tudelft.nl