Get my own profile
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Federica PaciElectronics and Computer Science, University of SouthamptonVerified email at soton.ac.uk
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Olga GadyatskayaResearch AssociateVerified email at uni.lu
Nicola DragoniAssoc Prof of Distributed Systems and Security, DTU - Prof of Computer Engineering, ORUVerified email at dtu.dk
Hristo KoshutanskiSafe Society LabsVerified email at safesocietylabs.com
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Giampaolo BellaVerified email at dmi.unict.it
Nataliia BielovaResearcher (chargé de recherche) at INRIA Sophia AntipolisVerified email at inria.fr
Katsiaryna LabunetsTPM, TU Delft, NetherlandsVerified email at tudelft.nl
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk
Ida SiahaanCanadian Institute of Cyber SecurityVerified email at unb.ca
Yudistira AsnarInstitut Teknologi BandungVerified email at stei.itb.ac.id
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Francesco M. DoniniFull Professor, Università della Tuscia - ViterboVerified email at unitus.it
Luca CompagnaSAP Security ResearchVerified email at sap.com
Giuseppe De GiacomoSapienza Università di RomaVerified email at dis.uniroma1.it
Woohyun ShimKorea Institute of Public AdministrationVerified email at kipa.re.kr
Fabio Massacci
Professor of Computer Science, University of Trento
Verified email at unitn.it - Homepage