Get my own profile
Public access
View all27 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
- andrea bondavalliProfessor of computer science, University of FirenzeVerified email at unifi.it
- John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
- Paolo LolliniUniversity of Florence - Dept. of Mathematics and Computer ScienceVerified email at unifi.it
- Andrea CeccarelliAssociate Professor at University of FlorenceVerified email at unifi.it
- Elda PajaAssociate Professor, IT University of CopenhagenVerified email at itu.dk
- Mattia SalnitriResearch Fellow at Politecnico di MilanoVerified email at polimi.it
- Haralambos MouratidisDirector, Institute for Analytics and Data Science (IADS), University of EssexVerified email at essex.ac.uk
- Michalis PavlidisPrincipal Lecturer in Cyber Security, University of BrightonVerified email at brighton.ac.uk
- Jose Fran. RuizAtosVerified email at atos.net
- Kuldar TaveterResearcher and Educator at the University of Tartu, EstoniaVerified email at ut.ee
- Susanna DonatelliComputer Science Professor, Universita' di Torino (Italy)Verified email at di.unito.it
- Elvio Gilberto AmparoreUniversitą di TorinoVerified email at di.unito.it
- Kerli MoosesUniversity of TartuVerified email at ut.ee
- Hina AnwarInstitute of Computer Science, University of TartuVerified email at ut.ee
- Tahira IqbalUniversity of TartuVerified email at ut.ee
- Leandro Dias da SilvaUniversidade Federal de AlagoasVerified email at ic.ufal.br
- Hanna KavalionakHPC, ISTI-CNR, PisaVerified email at isti.cnr.it