Get my own profile
Public access
View all26 articles
1 article
available
not available
Based on funding mandates
Co-authors
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Jerry den HartogTechnische Universiteit EindhovenVerified email at tue.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Sokratis VavilisInlecom InnovationVerified email at inlecomsystems.com
Yudistira AsnarInstitut Teknologi BandungVerified email at itb.ac.id
Laura GengaEindhoven University of TechnlogyVerified email at tue.nl
Pavlo BurdaEindhoven University of TechnologyVerified email at tue.nl
Meilof VeeningenPostdoctoral researcher, Eindhoven University of TechnologyVerified email at tue.nl
Volha BrylSpringer NatureVerified email at springer.com
Elisa CostanteEindhoven University of TechnologyVerified email at tue.nl
Eric YuProfessor, University of TorontoVerified email at utoronto.ca
Sowmya RavidasLeasePlanVerified email at leaseplan.com
Silvio RaniseFBKVerified email at fbk.eu
Charles MorissetReader in Security, Newcastle UniversityVerified email at ncl.ac.uk
Paolo GuardaFacoltà di Giurisprudenza - Università degli Studi di TrentoVerified email at unitn.it
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu