Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Michele BezziSAP Security ResearchVerified email at sap.com
- Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
- Raffaela MirandolaFull Professor, Karlsruhe Institute of TechnologyVerified email at kit.edu
- Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
- vincenzo grassiroma tor vergataVerified email at info.uniroma2.it
- Antinisca Di MarcoAssociate Professor at Universitŕ degli Studi di L'AquilaVerified email at univaq.it
- Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
- Samuel Paul KaluvuriLeocornoVerified email at leocorno.com
- Marta KwiatkowskaProfessor of Computing Systems, University of OxfordVerified email at comlab.ox.ac.uk
- Massimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
- Dorina PetriuProfessor, Systems and Computer Engineering Dept., Carleton UniversityVerified email at sce.carleton.ca
- Daniel dos SantosForescoutVerified email at forescout.com
- Bernhard SteffenProfessor für Informatik, TU DortmundVerified email at cs.uni-dortmund.de
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- Stanislav DashevskyiForescout TechnologiesVerified email at forescout.com
- Volkmar LotzSAP Security ResearchVerified email at sap.com
- Paul GraceSenior Lecturer, Computer Science, Aston University, UKVerified email at aston.ac.uk
- Gordon BlairDistinguished Professor of Distributed Systems, Lancaster UniversityVerified email at comp.lancs.ac.uk