Get my own profile
Public access
View all49 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Olga GadyatskayaAssistant professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Nicola DragoniProfessor in Secure Pervasive Computing, PhDVerified email at dtu.dk
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Nataliia BielovaPermanent Researcher (CRCN) at Inria, @nataliabielovaVerified email at inria.fr
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca
Yudistira AsnarInstitut Teknologi BandungVerified email at staff.stei.itb.ac.id
Woohyun ShimKorea Institute of Public AdministrationVerified email at kipa.re.kr
Duc-Ly VuIndependent ResearcherVerified email at unitn.it