Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Domenico CotroneoProfessor of Computer and System EngineeringVerified email at unina.it
Roberto PietrantuonoUniversity of Naples Federico IIVerified email at unina.it
Stefano RussoProfessor of Computer Engineering, Università di Napoli Federico IIVerified email at unina.it
Luigi De SimoneResearch Fellow @ University of Naples Federico IIVerified email at unina.it
Antonio Ken IannilloInterdisciplinary Centre for Security, Reliability and Trust (SnT) - University of Luxembourg (UL)Verified email at uni.lu
Anna LanzaroUniversity of Naples, Federico IIVerified email at unina.it
Henrique MadeiraUniversity of CoimbraVerified email at dei.uc.pt
Pietro LiguoriUniversity of Naples Federico IIVerified email at unina.it
Stefano RosielloFederico II University of Naples, ItalyVerified email at unina.it
Neeraj SuriDistinguished Chair Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Stefan WinterLMU MunichVerified email at stefan-winter.net
Antonio PecchiaUniversità degli Studi del SannioVerified email at unisannio.it
Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu
Michael GrottkeGfK SE and Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Marcello CinqueAssociate Professor, Federico II University of NaplesVerified email at unina.it
Joao DuraesProfessor at Instituto Superior de Engenharia de CoimbraVerified email at isec.pt
Nematollah BidokhtiFacebookVerified email at fb.com
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Dan Dongseong KIMAssociate Professor, Cybersecurity Group, The University of Queensland, AustraliaVerified email at uq.edu.au
Manoj NambiarTCS ResearchVerified email at tcs.com