Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
- Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
- Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Michael RusinowitchINRIAVerified email at loria.fr
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
- Silvio RaniseFBKVerified email at fbk.eu
- Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
- Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
- Daniel dos SantosForescoutVerified email at forescout.com
- Avinash SudhodananPrivacy Engineer at MetaVerified email at meta.com
- Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
- Llanos TobarraUNEDVerified email at scc.uned.es
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
- Marco RocchettoV-ResearchVerified email at v-research.it