Get my own profile
Public access
View all5 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Alessio MerloFull Professor of Computer Engineering, Centre for Higher Defense Studies (CASD), Rome, ItalyVerified email at unige.it
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Gabriele CostaIMT LuccaVerified email at imtlucca.it
Meriem GuerarUniversity of Genova, ItalyVerified email at unige.it
Davide CaputoTalos - Cyber Security Engineer, PhDVerified email at dibris.unige.it
Francesco PALMIERIUniversity of Salerno, Department of Computer ScienceVerified email at unisa.it
Simone AonzoEURECOMVerified email at eurecom.fr
Luca CaviglioneSenior Researcher at National Research Council of ItalyVerified email at ge.imati.cnr.it
Andrea RomdhanaTalos - Cyber Security Engineer, PhDVerified email at talos-sec.com
Konrad WronaNATO Communications and Information AgencyVerified email at ncia.nato.int
Enrico RussoUniversitą degli Studi di GenovaVerified email at unige.it
Ilsun YouKookmin UniversityVerified email at kookmin.ac.kr
Aniello CastiglioneDepartment of Management and Innovation Systems - University of Salerno - ItalyVerified email at ieee.org