Crea il mio profilo
Accesso pubblico
Visualizza tutto73 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nicola ZannoneEindhoven University of TechnologyEmail verificata su tue.nl
- John MylopoulosUniversity of OttawaEmail verificata su cs.toronto.edu
- Luca AllodiEindhoven University of TechnologyEmail verificata su tue.nl
- Paolo GiorginiProfessor of Computer Science, University of TrentoEmail verificata su unitn.it
- Federica PaciDepartment of Computer Science, University of VeronaEmail verificata su univr.it
- Olga GadyatskayaAssociate professor at LIACS, Leiden UniversityEmail verificata su liacs.leidenuniv.nl
- Nicola DragoniDeputy Director, Head of Section, Professor @ DTU ComputeEmail verificata su dtu.dk
- Ivan PashchenkoResearch Assistant Professor, University of TrentoEmail verificata su unitn.it
- Julian WilliamsProfessor of Accounting and Finance, Durham UniversityEmail verificata su durham.ac.uk
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Hristo KoshutanskiAtos Research & Innovation, SpainEmail verificata su atos.net
- Antonino SabettaSAP Security ResearchEmail verificata su sap.com
- Katsiaryna (Kate) LabunetsUtrecht UniversityEmail verificata su uu.nl
- Duc-Ly VuLecturer, Researcher, IndependentEmail verificata su uit.edu.vn
- Giampaolo BellaUniversity of CataniaEmail verificata su dmi.unict.it
- Nataliia BielovaPermanent Researcher (CRCN) at Inria Sophia AntipolisEmail verificata su inria.fr
- Ida SiahaanCanadian Institute of Cyber SecurityEmail verificata su unb.ca
- Artsiom YautsiukhinIIT-CNREmail verificata su iit.cnr.it
- Chan Nam NgoPrivacy Scaling ExplorationsEmail verificata su pse.dev
- Lawrence PaulsonUniversity of CambridgeEmail verificata su cam.ac.uk