Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Maurizio TesconiHead of Cyber Intelligence Lab - IIT - CNRVerified email at iit.cnr.it
Marinella PetrocchiIIT-CNR, Pisa, ItalyVerified email at iit.cnr.it
Marco AvvenutiDip. Ingegneria dell'Informazione, University of Pisa, ItalyVerified email at iet.unipi.it
Stefano CresciIIT-CNR, ItalyVerified email at iit.cnr.it
Andrea CiminoPostDoc, ILC CNR PisaVerified email at ilc.cnr.it
Fabio SaraccoCentro Ricerche "Enrico Fermi", Rome, ItalyVerified email at cref.it
Rocco De NicolaProfessor of Computer Science, IMT LuccaVerified email at imtlucca.it
Guido CaldarelliISC-CNR, Ca’ Foscari University of VeniceVerified email at unive.it
Andrea MarchettiCNR - IITVerified email at iit.cnr.it
Tiziano FagniResearcher, IIT-CNR, Pisa, ItalyVerified email at iit.cnr.it
Gregorio ProcissiUniversitą di PisaVerified email at unipi.it
Nicola BonelliUniversity of PisaVerified email at cnit.it
Clara BacciuIstituto di Informatica e Telematica - CNR, Pisa - WAFIVerified email at iit.cnr.it
Stefano GiordanoProfessore di Reti di Telecomunicazioni, Universitą di PisaVerified email at iet.unipi.it
Mario Giovanni Cosimo Antonio CiminoAssociate Professor, Department of Information EngineeringVerified email at unipi.it
Salvatore BellomoIIT-CNR PisaVerified email at iit.cnr.it