Get my own profile
Public access
View all65 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Nicola DragoniProfessor in Secure Pervasive Computing, PhDVerified email at dtu.dk
Olga GadyatskayaAssistant professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Duc-Ly VuLecturer, Resarcher at FPT UniversityVerified email at fe.edu.vn
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Nataliia BielovaPermanent Researcher (CRCN) at Inria, @nataliabielovaVerified email at inria.fr
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca
Stanislav DashevskyiForescout TechnologiesVerified email at forescout.com