Get my own profile
Public access
View all69 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Nicola DragoniDeputy Director, Head of Section, Professor @ DTU ComputeVerified email at dtu.dk
Olga GadyatskayaAssociate professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Duc-Ly VuUnknownVerified email at uit.edu.vn
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca
Nataliia BielovaPermanent Researcher (CRCN) at Inria, @nataliabielovaVerified email at inria.fr
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Woohyun ShimKorea Institute of Public AdministrationVerified email at kipa.re.kr