Get my own profile
Public access
View all55 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Nicola DragoniProfessor in Secure Pervasive Computing, PhDVerified email at dtu.dk
Olga GadyatskayaAssistant professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Nataliia BielovaPermanent Researcher (CRCN) at Inria, @nataliabielovaVerified email at inria.fr
Duc-Ly VuLecturer, Resarcher at FPT UniversityVerified email at fe.edu.vn
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca
Antonino SabettaSAP Security ResearchVerified email at sap.com
Chan Nam NgoKyber NetworkVerified email at kyber.network