Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Andrei SabelfeldChalmers University of TechnologyEmail verificata su chalmers.se
- Daniel SchoepeAmazonEmail verificata su schoepe.org
- Mads DamProfessor of Teleinformatics, KTH - Royal Institute of TechnologyEmail verificata su kth.se
- Roberto GuancialeKTHEmail verificata su kth.se
- Iulia BastysChalmers University of TechnologyEmail verificata su chalmers.se
- Mikhail ShcherbakovPh.D. Student, KTH Royal Institute of TechnologyEmail verificata su kth.se
- Gurvan Le GuernicInria, FranceEmail verificata su inria.fr
- Amir M. AhmadianEmail verificata su kth.se
- Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Benoit BaudryProfessor of Software Engineering, Université de MontréalEmail verificata su umontreal.ca
- Massimo MerroProfessor of Computer Science, Verona University - ItalyEmail verificata su univr.it
- Michele PasquaUniversity of VeronaEmail verificata su univr.it
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Daniel HedinMälardalen UniversityEmail verificata su mdh.se
- Mohammad M. AhmadpanahPh.D. student, Computer Science - Information Security, Chalmers University of TechnologyEmail verificata su chalmers.se
- Eric OlssonPh.D. student, Computer Science - Information Security, Chalmers University of TechnologyEmail verificata su chalmers.se
- Guido SalvaneschiAssociate Professor - University of St.GallenEmail verificata su csail.mit.edu
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Isabella MastroeniComputer Science Dept. - University of VeronaEmail verificata su univr.it
- Riccardo ScandariatoHead of the Institute of Software Security, Hamburg University of Technology (TUHH)Email verificata su tuhh.de