Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Maurizio TesconiHead of Cyber Intelligence Lab - IIT - CNRVerified email at iit.cnr.it
- Marinella PetrocchiIIT-CNR, Pisa, ItalyVerified email at iit.cnr.it
- Marco AvvenutiDip. Ingegneria dell'Informazione, University of Pisa, ItalyVerified email at iet.unipi.it
- Stefano CresciIIT-CNR, ItalyVerified email at iit.cnr.it
- Andrea CiminoPostDoc, ILC CNR PisaVerified email at ilc.cnr.it
- Fabio SaraccoCentro Ricerche "Enrico Fermi", Rome, ItalyVerified email at cref.it
- Rocco De NicolaProfessor of Computer Science, IMT LuccaVerified email at imtlucca.it
- Guido CaldarelliISC-CNR, Ca’ Foscari University of VeniceVerified email at unive.it
- Andrea MarchettiCNR - IITVerified email at iit.cnr.it
- Tiziano FagniResearcher, IIT-CNR, Pisa, ItalyVerified email at iit.cnr.it
- Gregorio ProcissiUniversitą di PisaVerified email at unipi.it
- Nicola BonelliUniversity of PisaVerified email at cnit.it
- Clara BacciuIstituto di Informatica e Telematica - CNR, Pisa - WAFIVerified email at iit.cnr.it
- Stefano GiordanoProfessore di Reti di Telecomunicazioni, Universitą di PisaVerified email at iet.unipi.it
- Mario Giovanni Cosimo Antonio CiminoAssociate Professor, Department of Information EngineeringVerified email at unipi.it
- Salvatore BellomoIIT-CNR PisaVerified email at iit.cnr.it