Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
Michele BezziSAP SecurityVerified email at sap.com
Antonia BertolinoGSSI (previously with ISTI-CNR)Verified email at gssi.it
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Raffaela MirandolaFull Professor, Karlsruhe Institute of TechnologyVerified email at kit.edu
vincenzo grassiroma tor vergataVerified email at info.uniroma2.itAntinisca Di MarcoAssociate Professor at Università degli Studi di L'AquilaVerified email at univaq.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Antonello CalabròISTI CNRVerified email at isti.cnr.it
Samuel Paul KaluvuriLeocornoVerified email at leocorno.com
Marta KwiatkowskaProfessor of Computing Systems, University of OxfordVerified email at comlab.ox.ac.uk
Massimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
Dorina PetriuProfessor, Systems and Computer Engineering Dept., Carleton UniversityVerified email at sce.carleton.ca
Daniel dos SantosForescoutVerified email at forescout.com
Bernhard SteffenProfessor für Informatik, TU DortmundVerified email at cs.uni-dortmund.de
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Stanislav DashevskyiForescout TechnologiesVerified email at forescout.com
Volkmar LotzSAP Security ResearchVerified email at sap.comPaul GraceSenior Lecturer, Computer Science, Aston University, UKVerified email at aston.ac.uk