Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Luca SpalazziProfessor of Computer Science, Università Politecnica delle Marche, Ancona, ItalyVerified email at univpm.it
- Sasha RubinUniversity of SydneyVerified email at sydney.edu.au
- Martin PinzgerProfessor of Software Engineering, Universität Klagenfurt, AustriaVerified email at aau.at
- Giovanni LivaPhD in Software Engineering, University of Klagenfurt, AustriaVerified email at aau.at
- Marco BaldiAssociate Professor in Telecommunications, Università Politecnica delle MarcheVerified email at univpm.it
- Tomer KotekTU WienVerified email at forsyte.at
- Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
- Florian ZulegerAssociate Professor, TU WienVerified email at forsyte.tuwien.ac.at
- M. Taimoor KhanCentre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at gre.ac.uk
- Andreas BollinUniv.-Prof. University of KlagenfurtVerified email at aau.at
- Franco ChiaraluceUniversità Politecnica delle MarcheVerified email at univpm.it
- Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
- Josef WidderInformal SystemsVerified email at informal.systems
- Ezio BartocciFaculty of Informatics, TU WienVerified email at tuwien.ac.at