Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Henrik PlateSenior Researcher, SAPVerified email at sap.com
Antonino SabettaSAP Security ResearchVerified email at sap.com
Luca CompagnaSAP Security ResearchVerified email at sap.com
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Daniel Ricardo dos SantosForescout TechnologiesVerified email at forescout.com
Silvio RaniseFBKVerified email at fbk.eu
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Michele BezziSAP Security ResearchVerified email at sap.com
Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Matteo CasalinoAmadeusVerified email at amadeus.com
Marco MarateaUniversity of GenovaVerified email at dibris.unige.it