

{"id":758,"date":"2021-05-10T13:10:16","date_gmt":"2021-05-10T11:10:16","guid":{"rendered":"https:\/\/ui.iit.cnr.it\/?page_id=758"},"modified":"2024-01-10T16:02:12","modified_gmt":"2024-01-10T15:02:12","slug":"phd-students","status":"publish","type":"page","link":"https:\/\/cyb.iit.cnr.it\/en\/education\/phd-students\/","title":{"rendered":"PhD Students"},"content":{"rendered":"<h4 class=\"wp-block-heading\"><strong><span style=\"background-color:rgba(0, 0, 0, 0);color:#eb6b42\" class=\"has-inline-color\"><strong>Lorenzo Cima<\/strong><\/span><\/strong><\/h4>\n\n\n\n<p><em>(Universit\u00e0 di Pisa)<\/em><br>PhD student in Computer Engineering<\/p>\n\n\n\n<p><br><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>Research area<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong>:<\/strong> Content moderation, Coordinated inauthentic behavior<br><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>CNR Tutor<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong>:<\/strong><em> <\/em><a href=\"https:\/\/www.iit.cnr.it\/stefano.cresci\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stefano Cresci<\/a><br><strong>University Tutor: <\/strong>Marco Avvenuti<\/p>\n\n\n\n<p><br><br><span style=\"background-color:rgba(0, 0, 0, 0);color:#eb6b42\" class=\"has-inline-color\"><strong><strong>Achille Pierre Paliotta<\/strong><\/strong><\/span><\/p>\n\n\n\n<p><em>(Scuola IMT Alti Studi Lucca)<\/em><br>PhD student in National PhD program in Cybersecurity &#8211; ciclo XXXVIII<\/p>\n\n\n\n<p><br><strong><strong><strong><strong><strong><strong><strong><strong><strong>Research area<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong>:<\/strong> Human, Economic, and Legal Aspects in Cybersecurity &#8211; Studio delle Teorie cospiratorie nei social media<br><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>CNR Tutor<\/strong><\/strong><\/strong><\/strong>:<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong> <a href=\"https:\/\/www.iit.cnr.it\/maurizio.tesconi\/\" target=\"_blank\" rel=\"noreferrer noopener\">Maurizio Tesconi<\/a>, <a href=\"https:\/\/www.iit.cnr.it\/caterina.senette\" target=\"_blank\" rel=\"noreferrer noopener\">Caterina Senette<\/a><\/p>\n\n\n\n<p><br><br><mark style=\"background-color:rgba(0, 0, 0, 0);color:#eb6b42\" class=\"has-inline-color\"><strong><strong>Lorenzo Mannocci<\/strong><\/strong><\/mark><\/p>\n\n\n\n<p><em>(Universit\u00e0 di Pisa, Computer science)<\/em><br>Ph.D. Student in Italian National Ph.D. in Artificial Intelligence<\/p>\n\n\n\n<p><br><strong><strong><strong><strong><strong><strong><strong><strong>Research area<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong>:<\/strong><\/strong> Information\/Influence Operations, Coordinated Inauthentic Behaviors, Bot Detection Detention and Social Network Analysis<br><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>CNR Tutor<\/strong><\/strong><\/strong><\/strong>:<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong> <a href=\"https:\/\/www.iit.cnr.it\/maurizio.tesconi\/\" target=\"_blank\" rel=\"noreferrer noopener\">Maurizio Tesconi<\/a>, <a href=\"https:\/\/www.iit.cnr.it\/stefano.cresci\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stefano Cresci<\/a><strong><br><strong><strong>University Tutor:<\/strong><\/strong><\/strong> Anna Monreale<\/p>\n\n\n\n<p><br><br><mark style=\"background-color:rgba(0, 0, 0, 0);color:#eb6b42\" class=\"has-inline-color\"><strong><strong>V<strong>ictoria Popa<\/strong><\/strong><\/strong><\/mark><\/p>\n\n\n\n<p><em>(Universit\u00e0 di Pisa, Computer science)<\/em><br>Ph.D. Student in Italian National Ph.D. in Artificial Intelligence<\/p>\n\n\n\n<p><br><strong><strong><strong><strong><strong><strong>Research area<\/strong><\/strong><\/strong><\/strong>:<\/strong><\/strong> Artificial Intelligence, Large Language Model, Blockchain<br><strong><strong><strong><strong><strong><strong><strong><strong>CNR Tutor<\/strong><\/strong><\/strong><\/strong>:<\/strong><\/strong><\/strong> <\/strong><a href=\"https:\/\/www.iit.cnr.it\/maurizio.tesconi\/\" target=\"_blank\" rel=\"noreferrer noopener\">Maurizio Tesconi<\/a>, <a href=\"http:\/\/www.iit.cnr.it\/guglielmo.cola\">Guglielmo Cola<\/a><\/p>\n\n\n\n<p><br><br><mark style=\"background-color:rgba(0, 0, 0, 0);color:#eb6b42\" class=\"has-inline-color\"><strong><strong><strong><strong>Lorenzo Alvisi<\/strong><\/strong><\/strong><\/strong><\/mark><\/p>\n\n\n\n<p><em>(Scuola IMT Alti Studi Lucca, Cyber Security)<\/em><br>PhD student in PhD student in National PhD program in Cybersecurity &#8211; ciclo XXXIX<\/p>\n\n\n\n<p><br><strong><strong><strong><strong><strong><strong>Research area<\/strong><\/strong><\/strong><\/strong>:<\/strong><\/strong> Human, Economic, and Legal Aspects in Cybersecurity &#8211; Coordinated Online Behavior<br><strong><strong><strong><strong><strong><strong>CNR Tutor<\/strong><\/strong><\/strong><\/strong>:<\/strong> <\/strong><a href=\"https:\/\/www.iit.cnr.it\/maurizio.tesconi\/\" target=\"_blank\" rel=\"noreferrer noopener\">Maurizio Tesconi<\/a>, <a href=\"http:\/\/www.iit.cnr.it\/serena.tardelli\">Serena Tardelli<\/a><\/p>\n\n\n\n<p><br><\/p>","protected":false},"excerpt":{"rendered":"<p>Lorenzo Cima (Universit\u00e0 di Pisa)PhD student in Computer Engineering Research area: Content moderation, Coordinated inauthentic behaviorCNR Tutor: Stefano CresciUniversity Tutor: Marco Avvenuti Achille Pierre Paliotta (Scuola IMT Alti Studi Lucca)PhD student in National PhD program in Cybersecurity &#8211; ciclo XXXVIII Research area: Human, Economic, and Legal Aspects in Cybersecurity &#8211; Studio delle Teorie cospiratorie nei [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":752,"menu_order":17,"comment_status":"closed","ping_status":"closed","template":"pagina_con_sottopagine.php","meta":{"footnotes":""},"class_list":["post-758","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/comments?post=758"}],"version-history":[{"count":7,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/758\/revisions"}],"predecessor-version":[{"id":1215,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/758\/revisions\/1215"}],"up":[{"embeddable":true,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/752"}],"wp:attachment":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/media?parent=758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}