Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Jerry den HartogTechnische Universiteit EindhovenVerified email at tue.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Sokratis VavilisEindhoven University of TechnologyVerified email at tue.nl
Yudistira AsnarInstitut Teknologi BandungVerified email at staff.stei.itb.ac.id
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Laura GengaEindhoven University of TechnlogyVerified email at tue.nl
Meilof VeeningenPostdoctoral researcher, Eindhoven University of TechnologyVerified email at tue.nl
Elisa CostanteEindhoven University of TechnologyVerified email at tue.nl
Volha BrylSpringer NatureVerified email at springer.com
Eric YuProfessor, University of TorontoVerified email at utoronto.ca
Charles MorissetSenior Lecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Silvio RaniseFBKVerified email at fbk.eu
Paolo GuardaFacoltà di Giurisprudenza - Università degli Studi di TrentoVerified email at unitn.it
Sowmya RavidasTechnische Universiteit EindhovenVerified email at tue.nl
Luca CompagnaSAP Security ResearchVerified email at sap.com
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu