Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
Antonino SabettaSAP Security ResearchVerified email at sap.com
Luca CompagnaSAP Security ResearchVerified email at sap.com
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Daniel Ricardo dos SantosForescout TechnologiesVerified email at forescout.com
Silvio RaniseFBKVerified email at fbk.eu
Michele BezziSAP Security ResearchVerified email at sap.com
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Matteo CasalinoAmadeusVerified email at amadeus.com
Marco MarateaUniversity of GenovaVerified email at dibris.unige.it