Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
- Antonino SabettaSAP Security ResearchVerified email at sap.com
- Luca CompagnaSAP Security ResearchVerified email at sap.com
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- Daniel dos SantosForescoutVerified email at forescout.com
- Michele BezziSAP Security ResearchVerified email at sap.com
- Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
- Silvio RaniseFBKVerified email at fbk.eu
- Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
- Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- Matteo CasalinoAmadeusVerified email at amadeus.com
- Marco MarateaUniversity of GenovaVerified email at dibris.unige.it