Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Jerry den HartogTechnische Universiteit EindhovenVerified email at tue.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Sokratis VavilisInlecom InnovationVerified email at inlecomsystems.com
Yudistira AsnarInstitut Teknologi BandungVerified email at itb.ac.id
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Laura GengaEindhoven University of TechnlogyVerified email at tue.nl
Meilof VeeningenPostdoctoral researcher, Eindhoven University of TechnologyVerified email at tue.nl
Elisa CostanteEindhoven University of TechnologyVerified email at tue.nl
Volha BrylSpringer NatureVerified email at springer.com
Eric YuProfessor, University of TorontoVerified email at utoronto.ca
Silvio RaniseFBKVerified email at fbk.eu
Charles MorissetSenior Lecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Sowmya RavidasLeasePlanVerified email at leaseplan.com
Paolo GuardaFacoltā di Giurisprudenza - Universitā degli Studi di TrentoVerified email at unitn.it
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
Luca CompagnaSAP Security ResearchVerified email at sap.com