Get my own profile
Public access
View all68 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Nicola DragoniDeputy Director, Head of Section, Professor @ DTU ComputeVerified email at dtu.dk
Olga GadyatskayaAssociate professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Duc-Ly VuLecturer at University of Information Technology, VNU-HCMVerified email at uit.edu.vn
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Nataliia BielovaPermanent Researcher (CRCN) at Inria, @nataliabielovaVerified email at inria.fr
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Stanislav DashevskyiForescout TechnologiesVerified email at forescout.com
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca