Measuring the Cost of Cybercrime
Andreotti-Thatcher il dossier dagli archivi segreti inglesi
JPMorgan: The Euro area adjustment: about halfway there
China’s Economic Espionage Prowess
How China Is Blocking Tor
Zen and the art of collecting and analyzing malware
IOR Annual Report 2012
Al-Qaeda Master Narratives and Affiliate Case Studies: Al-Qaeda in the Arabian Peninsula and Al-Qaeda in the Islamic Maghreb
Detecting crypto
Investigation into the processing of personal data for the whatsapp application
Detecting encrypted code
Gold and the International Monetary Syste
Ex-spy testifies in Mubarak trial
Science of Cyber-Security
Security and Africa's First World Cup
Hamas and the Terrorist Threat from the Gaza Strip. The Main Findings of the Goldstone Report Versus the Factual Findings
Compromising Tor Anonymity Exploiting P2P Information Leakage
The “Marco Polo” Effect: Chinese FDI in Italy *