Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Michele BezziSAP Security ResearchVerified email at sap.com
Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Raffaela MirandolaFull Professor, Karlsruhe Institute of TechnologyVerified email at kit.edu
vincenzo grassiroma tor vergataVerified email at info.uniroma2.it
Antinisca Di MarcoAssociate Professor at Universitŕ degli Studi di L'AquilaVerified email at univaq.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Samuel Paul KaluvuriLeocornoVerified email at leocorno.com
Marta KwiatkowskaProfessor of Computing Systems, University of OxfordVerified email at comlab.ox.ac.uk
Massimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
Dorina PetriuProfessor, Systems and Computer Engineering Dept., Carleton UniversityVerified email at sce.carleton.ca
Daniel dos SantosForescoutVerified email at forescout.com
Bernhard SteffenProfessor für Informatik, TU DortmundVerified email at cs.uni-dortmund.de
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Stanislav DashevskyiForescout TechnologiesVerified email at forescout.com
Volkmar LotzSAP Security ResearchVerified email at sap.com
Paul GraceSenior Lecturer, Computer Science, Aston University, UKVerified email at aston.ac.uk
Gordon BlairDistinguished Professor of Distributed Systems, Lancaster UniversityVerified email at comp.lancs.ac.uk