Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stefano CresciIIT-CNR, ItalyVerified email at iit.cnr.it
Marco AvvenutiDip. Ingegneria dell'Informazione, University of Pisa, ItalyVerified email at iet.unipi.it
Amaury TrujilloResearcher, IIT-CNRVerified email at iit.cnr.it
Lorenzo MannocciPh.D. Student in Artificial Intelligence, University of Pisa & IIT-CNRVerified email at phd.unipi.it
Maurizio TesconiHead of Cyber Intelligence Lab - IIT - CNRVerified email at iit.cnr.it
Benedetta TessaUniversity of Pisa, IIT-CNRVerified email at iit.cnr.it
Tiziano FagniResearcher, IIT-CNR, Pisa, ItalyVerified email at iit.cnr.it
Alessio MiaschiFull-time Researcher (RTDA), ItaliaNLP Lab @ CNR-ILC, PisaVerified email at ilc.cnr.it
Felice Dell'OrlettaResearcher in Computational Linguistics, ItaliaNLP Lab @ CNR-ILC PisaVerified email at ilc.cnr.it
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
Emanuele RiccoPh.D. Student, King Abdullah University of Science and Technology (KAUST)Verified email at kaust.edu.sa