Get my own profile
Public access
View all75 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
Olga GadyatskayaAssociate professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Nicola DragoniDeputy Director, Head of Section, Professor @ DTU ComputeVerified email at dtu.dk
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Antonino SabettaSAP Security ResearchVerified email at sap.com
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Duc-Ly VuLecturer at Eastern International UniversityVerified email at eiu.edu.vn
Nataliia BielovaPermanent Researcher (CRCN) at Inria Sophia AntipolisVerified email at inria.fr
Ida SiahaanChair of Automata Theory - TU DresdenVerified email at tu-dresden.de
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Chan Nam NgoPrivacy Scaling ExplorationsVerified email at pse.dev
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk