Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Niranjan SuriUS Army Research Laboratory (ARL) and Florida Institute for Human & Machine Cognition (IHMC)Email verificata su ihmc.us
Gomez LaurentSAP Security ResearchEmail verificata su sap.com
Alessandro ArmandoUniversity of GenovaEmail verificata su unige.it
Silvio RaniseFBKEmail verificata su fbk.eu
Attaullah BuriroAssistant Professor @ University of Ca Foscari, Venezia, Italy,Email verificata su unive.it
Alessandro SorniottiIBM Research - ZurichEmail verificata su zurich.ibm.com
Vincenzo PellegriniUniversity of Pisa - ItalyEmail verificata su idscorporation.com
Michał DykMilitary University of TechnologyEmail verificata su wat.edu.pl
Filippo Del FrariUniversity of TrentoEmail verificata su unitn.it
Frederic MontagutAvaloq Evolution AGEmail verificata su eurecom.fr
Cedric HebertSAP Security ResearchEmail verificata su sap.com
Marcin SzpyrkaAGH University of KrakowEmail verificata su agh.edu.pl
Bartosz JasiulNATO Communications and Information AgencyEmail verificata su ncia.nato.int
Krzysztof SzczypiorskiWarsaw University of Technology, PolandEmail verificata su pw.edu.pl
Krzysztof GierłowskiPolitechnika GdańskaEmail verificata su eti.pg.gda.pl
Annett LaubeProfessor of Computer Science / Head of Institute for ICT Based Management, Bern University of Applied SciencesEmail verificata su bfh.ch
Refik MolvaProfessor EURECOMEmail verificata su eurecom.fr
Gabriele CostaIMT LuccaEmail verificata su imtlucca.it
Luca VerderameUniversità degli Studi di GenovaEmail verificata su unige.it
Alessio MerloProfessor of Cybersecurity, Director of the School of Advanced Defense Studies (CASD), Rome, ItalyEmail verificata su unicasd.it