Get my own profile
Public access
View all56 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Nicola DragoniProfessor in Secure Pervasive Computing, PhDVerified email at dtu.dk
Olga GadyatskayaAssistant professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Nataliia BielovaPermanent Researcher (CRCN) at Inria, @nataliabielovaVerified email at inria.fr
Duc-Ly VuLecturer, Resarcher at FPT UniversityVerified email at fe.edu.vn
Antonino SabettaSAP Security ResearchVerified email at sap.com
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca
Stanislav DashevskyiForescout TechnologiesVerified email at forescout.com