Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
Michele BezziSAP Security ResearchVerified email at sap.com
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Raffaela MirandolaAssociate Professor, Politecnico di MilanoVerified email at elet.polimi.it
vincenzo grassiroma tor vergataVerified email at info.uniroma2.it
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Antinisca Di MarcoAssociate Professor at Università degli Studi di L'AquilaVerified email at univaq.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Paola InverardiProfessor of Computer ScienceVerified email at univaq.it
Samuel Paul KaluvuriLeocornoVerified email at leocorno.com
Marta KwiatkowskaProfessor of Computing Systems, University of OxfordVerified email at comlab.ox.ac.uk
Massimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
Bernhard SteffenProfessor für Informatik, TU DortmundVerified email at cs.uni-dortmund.de
Stanislav DashevskyiForescout TechnologiesVerified email at forescout.com
Dorina PetriuProfessor, Systems and Computer Engineering Dept., Carleton UniversityVerified email at sce.carleton.ca
Volkmar LotzSAP Security ResearchVerified email at sap.com
Daniel Ricardo dos SantosForescout TechnologiesVerified email at forescout.com
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Paul GraceSenior Lecturer, Computer Science, Aston University, UKVerified email at aston.ac.uk