Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Paolo GiorginiProfessor of Computer Science, University of TrentoEmail verificata su unitn.it
- Fabiano DalpiazDept. of Information and Computing Sciences, Utrecht UniversityEmail verificata su uu.nl
- John MylopoulosUniversity of OttawaEmail verificata su cs.toronto.edu
- Mattia SalnitriResearch Fellow at Politecnico di MilanoEmail verificata su polimi.it
- Jennifer HorkoffUniversity of Gothenburg/Chalmers University of TechnologyEmail verificata su chalmers.se
- Tong Li (李童)Associate Professor, Beijing University of TechnologyEmail verificata su bjut.edu.cn
- Alejandro MateAssociate Professor at University of Alicante (UA)Email verificata su dlsi.ua.es
- Fatma Başak AydemirAssistant Professor, Utrecht UniversityEmail verificata su uu.nl
- Luca PirasSenior Lecturer of Software Engineering, Privacy and Gamification at Middlesex University (UK)Email verificata su mdx.ac.uk
- Evellin CardosoFederal University of Goias, BrazilEmail verificata su ufg.br
- Per Håkon MelandSINTEF and NTNUEmail verificata su sintef.no
- Kristian BeckersTU MunichEmail verificata su in.tum.de
- Oksana KulykIT University of CopenhagenEmail verificata su itu.dk
- Amit K ChopraSenior lecturer, Lancaster UniversityEmail verificata su lancaster.ac.uk
- Mohamad GharibAssociate Professor, University of TartuEmail verificata su ut.ee
- Haralambos MouratidisDirector, Institute for Analytics and Data Science (IADS), University of EssexEmail verificata su essex.ac.uk
- Jose Fran. RuizAtosEmail verificata su atos.net
- Michalis PavlidisPrincipal Lecturer in Cyber Security, University of BrightonEmail verificata su brighton.ac.uk
- Marco RobolComputer Science, University Of TrentoEmail verificata su unitn.it
- Carson WooSauder School of Business, University of British ColumbiaEmail verificata su ubc.ca
Segui