About

I'm Francesco, an Information Engineer with a master's degree in Cybersecurity. Since October 2022, I'm attending the Ph.D. programme in <Brain, Mind and Computer Science> (BMCS) at the University of Padova. Here, I am part of the <Security and Privacy> (SPRITZ) research group, under the supervision of <Prof. Mauro Conti>.

My research interests lie primarily in Automotive Security, with a particular focus on Machine Learning and Deep Learning applications. I am also interested in Adversarial Attacks, Cyber Threat Intelligence, and Quantum Cryptography and Computing.

What I Do

  • Research Icon

    Research

    Compliance with ISO 21434 standard and UNECE R155/R156 regulations.

  • Teaching Icon

    Teaching Assistant

    Teaching activities for Cybersecurity Master's degree courses.

University and Departments

Resume

Education

  1. Ph.D. Brain, Mind and Computer Science

    2022 — Present </> University of Padova

    Research Topic: Toward Automotive Security, Compliance with ISO 21434 standard and UNECE R155/R156 regulations.

  2. M.Sc. Cybersecurity

    2020 — 2022 </> University of Padova

    Thesis: STIXnet, Entity and Relation Extraction from Unstructured Cyber Threat Intelligence Reports.

  3. B.Sc. Information Engineering

    2017 — 2020 </> University of Padova

    Thesis: Quantum Teleportation, Simulations and Execution on a Quantum Computer through IBM Quantum Experience.

Experience

  1. Teaching Assistant

    2022 — Present </> University of Padova

    Teaching activities for Cybersecurity Master's degree courses.

  2. Internship

    2022 — 2022 </> Leonardo S.p.A.

    Development of a platform for entity and relation extraction between STIX objects in unstructured CTI reports for Master's thesis project.

Teaching

As a Ph.D. student, I have the chance to be a teaching assistant of professors from my own <University>.

2022 </> 2023

  • Daniel lewis

    Computer & Network Sec

    Examining in depth the basic security concepts, with an analysis of the most recent research proposals in the field. At the end of the course, students will be able not only to critically analyze a software system as a whole, but also to independently update their skills in the field, through recent research results in the area.

  • Jessica miller

    Ethical Hacking

    Examining the Ethical Hacking concepts and scope. In particular, the course starts from the systematic study of the methodologies and tools used by hackers to carry out the various attacks in cyberspace. At the end of the course, students will be able to plan ethical hacking activities.

Contact

Contact Me