Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michael RusinowitchINRIAVerified email at loria.fr
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Silvio RaniseFBKVerified email at fbk.eu
Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
Daniel dos SantosForescoutVerified email at forescout.com
Avinash SudhodananPrivacy Engineer at MetaVerified email at meta.com
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
Llanos TobarraUNEDVerified email at scc.uned.es
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Marco RocchettoV-ResearchVerified email at v-research.it