Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Jerry den HartogTechnische Universiteit EindhovenVerified email at tue.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Sokratis VavilisEindhoven University of TechnologyVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Yudistira AsnarInstitut Teknologi BandungVerified email at staff.stei.itb.ac.id
Laura GengaEindhoven University of TechnlogyVerified email at tue.nl
Meilof VeeningenPostdoctoral researcher, Eindhoven University of TechnologyVerified email at tue.nl
Elisa CostanteEindhoven University of TechnologyVerified email at tue.nl
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Volha BrylSpringer NatureVerified email at springer.com
Eric YuProfessor, University of TorontoVerified email at utoronto.ca
Charles MorissetSenior Lecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Paolo GuardaFacoltà di Giurisprudenza - Università degli Studi di TrentoVerified email at unitn.it
Silvio RaniseFBKVerified email at fbk.eu
Sowmya RavidasTechnische Universiteit EindhovenVerified email at tue.nl
Luca CompagnaSAP Security ResearchVerified email at sap.com
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu