Get my own profile
Public access
View all51 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Olga GadyatskayaAssistant professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Nicola DragoniProfessor in Secure Pervasive Computing, PhDVerified email at dtu.dk
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Nataliia BielovaPermanent Researcher (CRCN) at Inria, @nataliabielovaVerified email at inria.fr
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca
Duc-Ly VuLecturer, Resarcher at FPT University, Visiting Researcher at Chainguard IncVerified email at fe.edu.vn
Woohyun ShimKorea Institute of Public AdministrationVerified email at kipa.re.kr
Yudistira AsnarInstitut Teknologi BandungVerified email at itb.ac.id