Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
- Fabiano DalpiazDept. of Information and Computing Sciences, Utrecht UniversityVerified email at uu.nl
- John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
- Mattia SalnitriResearch Fellow at Politecnico di MilanoVerified email at polimi.it
- Jennifer HorkoffUniversity of Gothenburg/Chalmers University of TechnologyVerified email at chalmers.se
- Tong Li (李童)Associate Professor, Beijing University of TechnologyVerified email at bjut.edu.cn
- Alejandro MateAssociate Professor at University of Alicante (UA)Verified email at dlsi.ua.es
- Fatma Başak AydemirAssistant Professor, Utrecht UniversityVerified email at uu.nl
- Luca PirasSenior Lecturer of Software Engineering, Privacy and Gamification at Middlesex University (UK)Verified email at mdx.ac.uk
- Evellin CardosoFederal University of Goias, BrazilVerified email at ufg.br
- Per Håkon MelandSINTEF and NTNUVerified email at sintef.no
- Kristian BeckersTU MunichVerified email at in.tum.de
- Oksana KulykIT University of CopenhagenVerified email at itu.dk
- Amit K ChopraSenior lecturer, Lancaster UniversityVerified email at lancaster.ac.uk
- Mohamad GharibAssociate Professor, University of TartuVerified email at ut.ee
- Haralambos MouratidisDirector, Institute for Analytics and Data Science (IADS), University of EssexVerified email at essex.ac.uk
- Jose Fran. RuizAtosVerified email at atos.net
- Michalis PavlidisPrincipal Lecturer in Cyber Security, University of BrightonVerified email at brighton.ac.uk
- Marco RobolComputer Science, University Of TrentoVerified email at unitn.it
- Carson WooSauder School of Business, University of British ColumbiaVerified email at ubc.ca