Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Modeling of the Behaviour of an Autonomic Router., , , and . VALUETOOLS, page 193-194. ACM, (2019)Applying Machine Learning to Weather and Pollution Data Analysis for a Better Management of Local Areas: The Case of Napoli, Italy., , , , , and . IoTBDS, page 354-363. SCITEPRESS, (2021)A Conceptual Model for the General Data Protection Regulation., , and . ICCSA (8), volume 12956 of Lecture Notes in Computer Science, page 60-77. Springer, (2021)Exploring a Federated Learning Approach to Enhance Authorship Attribution of Misleading Information from Heterogeneous Sources., , , , and . IJCNN, page 1-8. IEEE, (2021)Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis., , , , and . Int. J. Grid Util. Comput., 14 (1): 15-28 (2023)A cyber warfare perspective on risks related to health IoT devices and contact tracing., , , , , and . Neural Comput. Appl., 35 (19): 13823-13837 (July 2023)Hybrid Simulation of Energy Management in IoT Edge Computing Surveillance Systems., , , and . EPEW, volume 13104 of Lecture Notes in Computer Science, page 345-359. Springer, (2021)XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks., , , and . AINA (5), volume 203 of Lecture Notes on Data Engineering and Communications Technologies, page 317-326. Springer, (2024)Fuzzy-based Severity Evaluation in Privacy Problems: an Application to Healthcare., , , , , and . EDCC, page 147-154. IEEE, (2024)Evaluating the Effectiveness of Privacy and Security Promotion Strategies., and . ICCSA (Workshops 6), volume 14109 of Lecture Notes in Computer Science, page 134-148. Springer, (2023)