Alessio Merlo - Curriculum Vitae - unige.it · 2019. 10. 19. · Alessio Merlo - Curriculum Vitae -...

19
$// % 'HFUHWR 5HWWRUH 8QLYHUVLWj GL 5RPD ³/D 6DSLHQ]D´ Q GHO $OHVVLR 0HUOR &XUULFXOXP 9LW ',%5,6 8QLYHUVLW\ RI *HQRD 9LDOH ) &DXVD *HQRD , ,WDO\ 3KRQH 0RELOH (PDLO DOHVVLRPHUOR#XQLJHLW 3(& PDLO DOHVVLRPHUOR#SHFQHW +RPH KWWSFVHFLWSHRSOHDOHVVLRBPHUOR %RUQ )HEUXDU\ ²6DYRQD ,WDO\ 1DWLRQDOLW\ ,WDOLDQ 7D[ FRGH 05//66%,. 6XPPDU\ &XUUHQW SRVLWLRQV ± ¢Qlap¡ :££a£“;l“ r¡pVQ££p¡ t'Qlfi¡Q '¡;Jeu al Ipjsfi“Q¡ PlZalQQ¡alZ ',%5,6 8QL YHUVLW\ RI *HQRD ± ]Q;N RI WKH 0RELOH 6HFXULW\ 5HVHDUFK *URXS DW ',%5,6 WKH 8QLYHUVLW\ RI *HQRD 7KH JURXS LQFOXGHV 3RVWGRFV 3K' VWXGHQWV DQG 0DVWHU VWXGHQWV ± Ma¡QJ“p¡ RI WKH 3RVWJUDGXDWH 0DVWHU 0DVWHU GL ,, /LYHOOR LQ &\EHUVHFXULW\ DQG &ULWLFDO ,QIUDVWUXFWXUH 3URWHFWLRQ 8QLYHUVLW\ RI *HQRD KWWSVZZZSHUIRUPXQLJHLWPDVWHUPDVWHUF\EHUVHFXULW\KWPO 5HVHDUFK ,QWHUHVWV 0RELOH 6HFXULW\ ,R7 6HFXULW\ $SSRLQWPHQWV KHOG ¢Qlap¡ :££a£“;l“ r¡pVQ££p¡ t~'M_AL 'Qlfi¡Q '¡;Jeu al Ipjsfi“Q¡ PlZalQQ¡alZ ',%5,6 8QLYHUVLW\ RI *HQRD ,WDO\ V¡pj oJ“w ‹…q¥ Ua•QN_“Q¡j :££a£“;l“ r¡pVQ££p¡ t~'M_:u ',%5,6 8QLYHUVLW\ RI *HQRD ,WDO\ V¡pj ¢Qs“w ‹…qX “p :fiZw ‹…q¥ Ua•QN_“Q¡j :££a£“;l“ r¡pVQ££p¡ (&DPSXV 8QLYHUVLW\ 1RYHGUDWH ,WDO\ V¡pj i;¡w ‹…qq “p :fiZw ‹…qX ~Q£Q;¡J^ :££pJa;“Q ',%5,6 8QLYHUVLW\ RI *HQRD ,WDO\ V¡pj i;¡w ‹…qq “p :fiZw ‹…qX rp£“_MpJ“p¡;g UQggp· ',67 8QLYHUVLW\ RI *HQRD ,WDO\ V¡pj UQBw ‹…q… “p UQBw ‹…qq ~Q£Q;¡J^ :££pJa;“Q ,(,,7 1DWLRQDO 5HVHDUFK &RXQFLO *HQRD V¡pj kp†w ‹……W “p i;¡w ‹…qq r^Mw ¢“fiNQl“ ',6, 8QLYHUVLW\ RI *HQRD ,WDO\ IURP b;lw ‹……W “p :s¡w ‹…q…

Transcript of Alessio Merlo - Curriculum Vitae - unige.it · 2019. 10. 19. · Alessio Merlo - Curriculum Vitae -...

  • http://www.dibris.unige.ithttp://www.unige.itmailto:[email protected]:[email protected]://csec.it/people/alessio_merlo/https://www.perform.unige.it/master/master-cybersecurity.htmlAlessio Merlo

    Alessio Merlo

  • http://abilitazione.miur.it/http://abilitazione.miur.it/https://www.elsevier.com/books/adaptive-mobile-computing/migliardi/978-0-12-804603-6https://doi.org/10.1016/C2015-0-01858-5http://www.igi-global.com/book/social-network-engineering-secure-web/72359http://www.igi-global.com/book/social-network-engineering-secure-web/72359https://doi.org/10.1016/j.future.2019.09.013https://ieeexplore.ieee.org/document/8674039https://doi.org/10.1109/MSEC.2019.2894917

  • https://www.sciencedirect.com/science/article/pii/S0167404818307557https://doi.org/10.1016/j.cose.2018.06.007https://onlinelibrary.wiley.com/doi/full/10.1002/cpe.4431http://onlinelibrary.wiley.com/doi/10.1002/cpe.4431/abstracthttps://www.sciencedirect.com/science/article/pii/S0167404817302638https://doi.org/10.1016/j.cose.2017.12.003https://ieeexplore.ieee.org/document/8113505https://doi.org/10.1109/TSUSC.2017.2774184http://jowua.com/vol8no2.phphttp://www.sciencedirect.com/science/article/pii/S0167739X17303709https://doi.org/10.1016/j.future.2017.03.012http://ieeexplore.ieee.org/document/7547911/https://doi.org/10.1109/TDSC.2016.2601603http://dx.doi.org/10.1016/j.future.2016.06.014http://dx.doi.org/10.1016/j.future.2016.06.014http://dx.doi.org/10.1093/jigpal/jzw053http://dx.doi.org/10.1093/jigpal/jzw053http://dx.doi.org/10.1016/j.pmcj.2016.01.006http://dx.doi.org/10.1016/j.pmcj.2016.01.006http://content.iospress.com/articles/journal-of-high-speed-networks/jhs539http://content.iospress.com/articles/journal-of-high-speed-networks/jhs539http://content.iospress.com/articles/journal-of-high-speed-networks/jhs539http://content.iospress.com/articles/journal-of-computer-security/jcs530http://content.iospress.com/articles/journal-of-computer-security/jcs530http://dx.doi.org/10.1016/j.pmcj.2015.05.005http://dx.doi.org/10.1016/j.pmcj.2015.05.005http://link.springer.com/article/10.1007%252Fs10207-014-0252-yhttp://link.springer.com/article/10.1007%252Fs10207-014-0252-yhttp://isyou.info/jowua/papers/jowua-v5n4-5.pdfhttp://isyou.info/jowua/papers/jowua-v5n4-2.pdfhttp://www.sciencedirect.com/science/article/pii/S1874548214000626http://www.sciencedirect.com/science/article/pii/S1874548214000626http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6838866http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6838866

  • http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6782287http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6782287http://cybersecurity.ieee.org/http://www.inderscience.com/info/inarticle.php?artid=60717http://www.inderscience.com/info/inarticle.php?artid=60717http://www.sciencedirect.com/science/article/pii/S0167404813000540http://www.sciencedirect.com/science/article/pii/S0167404813000540http://dl.acm.org/citation.cfm?id=2595811http://dl.acm.org/citation.cfm?id=2595811http://www.sciencedirect.com/science/article/pii/S0167739X12001574http://www.sciencedirect.com/science/article/pii/S0167739X12001574http://www.ai-lab.it/merlo/publications/jisis-2012.pdfhttp://isyou.info/conf/mist12/http://www.ai-lab.it/merlo/publications/JIAS-2012.pdfhttp://www.sciencedirect.com/science/article/pii/S1353485812700156http://www.sciencedirect.com/science/article/pii/S1353485812700156http://jigpal.oxfordjournals.org/content/early/2012/08/03/jigpal.jzs029.refshttp://jigpal.oxfordjournals.org/content/early/2012/08/03/jigpal.jzs029.refshttp://www.ai-lab.it/merlo/publications/JIAS-2011.pdfhttp://onlinelibrary.wiley.com/doi/10.1002/cpe.1641/abstracthttp://onlinelibrary.wiley.com/doi/10.1002/cpe.1641/abstracthttp://dl.acm.org/citation.cfm?id=1593540http://dl.acm.org/citation.cfm?id=1593540Internet%20of%20Things%20and%20Secure%20Smart%20Environments:%20Success%20and%20Pitfallshttp://www.igi-global.com/chapter/graph-based-approach-model-privacy/75893http://www.igi-global.com/chapter/graph-based-approach-model-privacy/75893http://www.igi-global.com/chapter/social-network-engineering-secure-web/75885http://www.igi-global.com/chapter/social-network-engineering-secure-web/75885http://www.elsevier.com/books/handbook-of-green-information-and-communication-systems/obaidat/978-0-12-415844-3http://www.elsevier.com/books/handbook-of-green-information-and-communication-systems/obaidat/978-0-12-415844-3http://www.springer.com/us/book/9781461405078http://www.springer.com/us/book/9781461405078

  • 33rd

    23rd

    28th

    28th

    25th

    14th

    12th

    10th

    14th

    11th

    32nd

    12th

    http://link.springer.com/chapter/10.1007%252F978-1-4419-5574-6_8http://link.springer.com/chapter/10.1007%252F978-1-4419-5574-6_8http://link.springer.com/chapter/10.1007%252F978-1-4419-5574-6_8http://www.springer.com/us/book/9781441955951http://www.springer.com/us/book/9781441955951http://link.springer.com/chapter/10.1007%252F978-0-387-09663-6_32http://link.springer.com/chapter/10.1007%252F978-0-387-09663-6_32https://dbsec2019.cse.sc.eduhttps://doi.org/10.1007/978-3-030-22479-0_7https://www.sigsac.org/ccs/CCS2018/https://doi.org/10.1145/3331076.3331093http://home.ing.unisannio.it/wetice2019/http://home.ing.unisannio.it/wetice2019/https://www.sigsac.org/ccs/CCS2018/http://voyager.ce.fit.ac.jp/conf/aina/2018/https://doi.org/10.1109/WAINA.2018.00144http://mamilab.esi.uclm.es/ucami2018/https://www.mdpi.com/2504-3900/2/19/1231/pdfhttp://css2018.di.unisa.it/https://doi.org/10.1007/978-3-030-01689-0_5http://www.secrypt.icete.org/http://voyager.ce.fit.ac.jp/conf/cisis/2017/https://doi.org/10.1007/978-3-319-61566-0_96http://ifipsec.org/2017/https://link.springer.com/chapter/10.1007/978-3-319-58469-0_36http://gpc2017.di.unisa.it/gpc2017/https://link.springer.com/chapter/10.1007/978-3-319-57186-7_52https://link.springer.com/chapter/10.1007/978-3-319-57186-7_52

  • 12th

    12th

    11th

    11th

    15th

    30th

    28th

    10th

    10th

    6th

    7th

    http://gpc2017.di.unisa.it/gpc2017/https://link.springer.com/chapter/10.1007/978-3-319-57186-7_12http://hpcs2017.cisedu.infohttps://doi.org/10.1109/HPCS.2017.152http://hpcs2016.cisedu.infohttps://doi.org/10.1109/HPCSim.2016.7568370http://meeting.xidian.edu.cn/conference/AsiaCCS2016/home.htmlhttp://dl.acm.org/citation.cfm?id=2897887http://www.icmcis2016.euhttp://dx.doi.org/10.1109/ICMCIS.2016.7496587http://voyager.ce.fit.ac.jp/conf/aina/2016/http://dx.doi.org/10.1109/WAINA.2016.109http://www.sigsac.org/ccs/CCS2015/http://dx.doi.org/10.1145/2808783.2808791http://www.sigsac.org/ccs/CCS2015/http://dx.doi.org/10.1145/2808783.2808786http://www.cs.upc.edu/~net4all/3PGCIC-2015/http://dx.doi.org/10.1109/3PGCIC.2015.53http://dx.doi.org/10.1109/3PGCIC.2015.53http://csf2015.di.univr.it10.1109/CSF.2015.29http://www.etaps.org/index.php/2015http://link.springer.com/chapter/10.1007%252F978-3-662-46681-0_19http://hpcs2015.cisedu.info/http://dx.doi.org/10.1109/HPCSim.2015.7237043http://hpcs2015.cisedu.info/http://dx.doi.org/10.1109/HPCSim.2015.7237041http://voyager.ce.fit.ac.jp/conf/incos/2014/index.htmlhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7057152http://www.sigsac.org/wisec/WiSec2014/http://dl.acm.org/citation.cfm?id=2627410

  • 9th

    8th

    7th

    27th

    28th

    28th

    8th

    8th

    1st

    27th

    7th

    6th

    1st

    7th

    http://hpcs2014.cisedu.info/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6903732http://voyager.ce.fit.ac.jp/conf/imis/2014/http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6975470http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=34288&copyownerid=7330http://link.springer.com/chapter/10.1007%252F978-3-319-07995-0_50http://www.aina-conference.org/2013http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6550615http://www.acm.org/conferences/sac/sac2013/http://dl.acm.org/citation.cfm?id=2480707http://www.ifipsec.org/http://link.springer.com/chapter/10.1007%252F978-3-642-39218-4_14http://www.ares-conference.eu/ares2013/www.ares-conference.eu/conf/index.htmlhttp://link.springer.com/chapter/10.1007%252F978-3-642-40588-4_25http://hpcs2013.cisedu.info/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6641428&tag=1http://www.ifs.tuwien.ac.at/ict-eurasia/history/eurasia2013/http://link.springer.com/chapter/10.1007%252F978-3-642-36818-9_52http://link.springer.com/chapter/10.1007%252F978-3-642-36818-9_52http://www.ifipsec.org/http://link.springer.com/chapter/10.1007%252F978-3-642-30436-1_2http://www.cs.bham.ac.uk/~mdr/research/projects/12-TGC/http://link.springer.com/chapter/10.1007%252F978-3-642-41157-1_5http://lifc.univ-fcomte.fr/tap2012/http://link.springer.com/chapter/10.1007%252F978-3-642-30473-6_3https://distrinet.cs.kuleuven.be/events/essos/2014/calls-workshop-SmartGridSecurity.htmlhttp://link.springer.com/chapter/10.1007%252F978-3-642-38030-3_8http://2012.eclipse-it.org/http://www.mirlabs.org/ias11/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6122781&tag=1http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6122781&tag=1

  • 4th

    34th

    9th

    6th

    2nd

    2nd

    http://www2.unb.ca/pstnet/pst2011/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5971961http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5971961http://cisis.usal.es/http://link.springer.com/chapter/10.1007%252F978-3-642-21323-6_11http://link.springer.com/chapter/10.1007%252F978-3-642-21323-6_11http://www.mipro.hr/MIPRO2011/ELink.aspxhttp://www.ieee-nca.org/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5598212http://www.mirlabs.org/ias10/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5604068http://www.smartlab.cis.strath.ac.uk/M-MPAC/2010/http://dl.acm.org/citation.cfm?id=1890795http://voyager.ce.fit.ac.jp/conf/cisis/2013/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4606701http://voyager.ce.fit.ac.jp/conf/cisis/2013/http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4606671http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4606671http://www.onthemove-conferences.org/index.php/previousevents/otm06/conf06/gada06http://link.springer.com/chapter/10.1007%252F11914952_4%23page-1http://www.cnr.it/ontology/cnr/individuo/prodotto/ID155166http://www.cnr.it/peoplepublic/peoplepublic/index/downloadprodotto/i/113937http://www.disi.unige.it/dottorato/THESES/2010-06-MerloA.pdfhttp://www.disi.unige.it/dottorato/THESES/2010-06-MerloA.pdfhttp://www.disi.unige.it/dottorato/THESES/2010-06-MerloA.pdf

  • http://mondodigitale.aicanet.net/2013-4/articoli/03_Dispositivi_mobili_nuovi_problemi_di_sicurezza.pdfhttp://ercim-news.ercim.eu/en93/special/market-based-security-for-mobile-deviceshttp://mondodigitale.aicanet.net/2012-4/articoli/03_caviglione.pdfhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7042716http://cybersecurity.ieee.orghttp://cybersecurity.ieee.orghttp://genova.talentgarden.org/http://www.talos-security.com/http://www.smartcupliguria.it/http://www.talos-security.com/http://ideachallenge.eitictlabs.euhttp://www.csec.it/software/byodroid/index.htmlhttps://unige.it/unimprese/startcup2013.shtmlhttp://www.csec.it/software/byodroid/index.htmlhttp://www.aicanet.ithttp://www.federcomin.ithttp://www.isict.ithttp://www.isict.it

  • 30th

    21st

    11th

    20th

    1st

    16th

    http://www.prettocassanello.it/genova/http://www.prettocassanello.it/genova/https://www.consorzio-cini.it/index.php/it/lab-cyber-securityhttps://www.dis.uniroma1.it/https://www.eu-space.eu/http://hpcs2017.cisedu.infohttps://www.qub.ac.ukhttps://www.ecs.soton.ac.uk/https://circie.unige.it/https://www.consorzio-cini.it/index.php/it/https://www.eitdigital.eu/https://www.gft.com/it/it/index/

  • 15th

    http://www.s3lab.polito.it/progetti/progetti_in_corso/miehttp://www.siitscpa.it/index.php/progetti/2011-09-24-14-26-55/plug-inhttp://people.unica.it/bart/2012/10/24/security-horizons/http://people.unica.it/bart/2012/10/24/security-horizons/https://sites.google.com/a/manydesigns.com/cloud_security/http://www.spacios.euhttp://www.siitscpa.it/index.php/progetti/2011-09-24-14-26-54/sintesishttp://www.siitscpa.it/index.php/progetti/2011-09-24-14-26-54/sintesishttps://www.inderscience.com/jhome.php?jcode=ijeshttps://www.elsevier.com/books/adaptive-mobile-computing/unknown/978-0-12-804603-6http://www.igi-global.com/publish/call-for-papers/call-details/2020http://www.igi-global.com/publish/call-for-papers/call-details/2020http://www.iospress.nl/journal/journal-of-high-speed-networks/http://www.igi-global.com/book/social-network-engineering-secure-web/72359http://www.igi-global.com/book/social-network-engineering-secure-web/72359http://www.igi-global.com/book/social-network-engineering-secure-web/72359http://hpcs2017.cisedu.infohttp://hpcs2017.cisedu.info

  • 5th

    15th

    7th

    13th

    6th

    12th

    5th

    11th

    4th

    1st

    9th

    8th

    6th

    http://www.ieee-security.org/TC/EuroSP2020/committee-organizing.htmlhttp://www.ieee-security.org/TC/EuroSP2020/committee-organizing.htmlhttp://aixia2016.unige.ithttp://hpcs2017.cisedu.info/conference/workshops---hpcs2017/workshop12-spcloudhttp://hpcs2017.cisedu.info/conference/workshops---hpcs2017/workshop11-shpcshttp://hpcs2016.cisedu.info/2-conference/workshops---hpcs2016/workshop10-spcloudhttp://hpcs2016.cisedu.info/2-conference/workshops---hpcs2016/workshop09-shpcshttp://hpcs2015.cisedu.info/2-conference/hpcs-2015-workshops/hpcs-2015-workshop-11-spcloudhttp://hpcs2015.cisedu.info/2-conference/hpcs-2015-workshops/hpcs-2015-workshop-10-shcpshttp://hpcs2014.cisedu.info/2-conference/workshops/workshop-11-spcloudhttp://ita-sec2017.dais.unive.it/http://voyager.ce.fit.ac.jp/conf/imis/2015/http://voyager.ce.fit.ac.jp/conf/imis/2014/http://voyager.ce.fit.ac.jp/conf/incos/2014/https://www.computer.org/csdl/journal/ec/misc/14393https://www.journals.elsevier.com/information-scienceshttps://www.computer.org/csdl/journal/ec/misc/14393https://link.springer.com/journal/500http://tcps.acm.org/http://link.springer.com/journal/11227https://www.journals.elsevier.com/pervasive-and-mobile-computing/

  • 35th

    13th

    15th

    4th

    1st

    18th

    16th

    23rd

    34th

    12th

    13th

    14th

    13th

    33nd

    4th

    3rd

    8th

    31st

    12th

    32nd

    7th

    http://www.journals.elsevier.com/computers-and-electrical-engineering/http://www.journals.elsevier.com/telematics-and-informatics/http://www.journals.elsevier.com/journal-of-systems-and-software/http://www.iospress.nl/journal/journal-of-high-speed-networks/http://www.journals.elsevier.com/computers-and-security/http://www.journals.elsevier.com/future-generation-computer-systems/http://www.journals.elsevier.com/journal-of-network-and-computer-applicationshttp://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-0634http://www.sigapp.org/sac/sac2020/http://www.wistp.org/committees/http://www.mirlabs.org/ias19/http://isyou.info/conf/mobisec19/https://sites.google.com/site/acmracs2019/https://sites.google.com/fbk.eu/finsec19https://forumpoint2.eventsair.com/QuickEventWebsitePortal/trustcom19/tc19http://www.secrypt.icete.org/http://home.ing.unisannio.it/wetice2019/http://www.sigapp.org/sac/sac2019/http://wistp2018.wistp.org/http://www.gpc2018.org/http://www.mirlabs.net/ias18http://hpcs2018.cisedu.info/2-conference/workshops---hpcs2018/workshop10-shpcshttp://www.sigapp.org/sac/sac2018/http://wpage.unina.it/fpalmier/EAsyCoSe2017/EAsyCoSe2017/Home.htmlhttp://cedric.cnam.fr/workshops/mspn2017/http://cs-conferences.acadiau.ca/euspn-17/organizing-commitee.htmlhttp://voyager.ce.fit.ac.jp/conf/aina/2017/index.htmlhttp://gpc2017.di.unisa.it/GPC_2017/Home.htmlhttp://hpcs2017.cisedu.infohttp://hpcs2017.cisedu.info/conference/workshops---hpcs2017/workshop12-spcloud

  • 13th

    32nd

    8th

    10th

    20162nd

    3rd

    31st

    6th

    12th

    9th

    30th

    1st

    5th

    10th

    7th

    4th

    29th

    17th

    6th

    2nd

    8th

    8th

    9th

    10th

    16th

    http://hpcs2017.cisedu.info/conference/workshops---hpcs2017/workshop11-shpcshttp://www.sigapp.org/sac/sac2017/http://isyou.info/conf/mist16/http://www.wistp.org/committees/http://isyou.info/conf/mobisec16/http://cedric.cnam.fr/workshops/mspn2016/http://wpage.unina.it/fpalmier/EAsyCoSe2016/EAsyCoSe2016/Home.htmlhttp://hpcs2016.cisedu.info/3-committees/technical-program-committeehttp://hpcs2016.cisedu.info/2-conference/workshops---hpcs2016/workshop10-spcloudhttp://hpcs2016.cisedu.info/2-conference/workshops---hpcs2016/workshop09-shpcshttp://www.wistp.org/committees/http://hpcs2015.cisedu.info/http://cedric.cnam.fr/workshops/mspn2015/committee.htmlhttp://hpcs2015.cisedu.info/2-conference/hpcs-2015-workshops/hpcs-2015-workshop-11-spcloudhttp://hpcs2015.cisedu.info/2-conference/hpcs-2015-workshops/hpcs-2015-workshop-10-shcpshttp://voyager.ce.fit.ac.jp/conf/incos/2015/committees.htmlhttp://hpcs2014.cisedu.info/2-conference/workshops/workshop-11-spcloudhttp://hpcs2014.cisedu.info/3-committees/tpchttp://voyager.ce.fit.ac.jp/conf/nbis/2014/committee.htmlhttp://voyager.ce.fit.ac.jp/conf/incos/2014/committees.html/http://wpage.unina.it/fpalmier/EAsyCoSe2014/EAsyCoSe2014/Home.htmlhttp://voyager.ce.fit.ac.jp/conf/imis/2014/committee.htmlhttp://voyager.ce.fit.ac.jp/conf/cisis/2014/committee.htmlhttp://hpcs2014.cisedu.info/2-conference/workshops/workshop-10-shpcshttp://www.mirlabs.org/ias14/committees.phphttp://voyager.ce.fit.ac.jp/conf/nbis/2013/committee.html

  • 28th

    9th

    8th

    1st

    8th

    7th

    7th

    2nd

    2nd

    2nd

    2nd

    2nd

    http://www.ifipsec.org/http://www.mirlabs.org/ias13/committees.phphttp://hpcs2013.cisedu.info/2-conference/workshops/workshop-10-shpcshttp://wpage.unina.it/fpalmier/EAsyCoSe2013/EAsyCoSe2013/Home.htmlhttp://www.mirlabs.net/ias12/http://hpcs2012.cisedu.info/2-conference/workshops/workshop-12-shocshttp://www.mirlabs.org/ias11/committee.htmlhttp://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://phd.dibris.unige.it/csse/index.phphttp://www.dibris.unige.it/en/research/programs?view=prdetail&prog=5http://www.dibris.unige.it/en/research/programs?view=prdetail&prog=5http://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://www.mastercybersecurity.it/https://tesi.clusit.it/http://www.isict.ithttp://www.isict.it

  • 2nd

    http://www.difesa.it/EN/SMD/JMI/AFIT/Pagine/default.aspxhttp://www.difesa.it/EN/SMD/JMI/AFIT/Pagine/default.aspxhttp://www.mastercybersecurity.it/http://www.mastercybersecurity.it/http://csec.it/events/clusit-17/http://www.csec.it/pages/events/CLUSIT-2016-WS.htmlhttp://www.csec.it/pages/events/CLUSIT-2015-WS.htmlhttp://www.csec.it/pages/events/CLUSIT-2014-WS.htmlhttp://www.talos-security.comhttps://www.ncia.nato.inthttps://www.ncia.nato.int

  • 257

    3239

    253

    1915

    http://www.dibris.unige.it/merlo-alessio