Get my own profile
Public access
View all75 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
- John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
- Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
- Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
- Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
- Olga GadyatskayaAssociate professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
- Nicola DragoniDeputy Director, Head of Section, Professor @ DTU ComputeVerified email at dtu.dk
- Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
- Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Antonino SabettaSAP Security ResearchVerified email at sap.com
- Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
- Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
- Duc-Ly VuLecturer at Eastern International UniversityVerified email at eiu.edu.vn
- Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
- Nataliia BielovaResearch Scientist at Inria (ex-CNIL)Verified email at inria.fr
- Ida SiahaanChair of Automata Theory - TU DresdenVerified email at tu-dresden.de
- Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
- Chan Nam NgoPrivacy Scaling ExplorationsVerified email at pse.dev
- Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk