Get my own profile
Public access
View all12 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Jerry den HartogTechnische Universiteit EindhovenVerified email at tue.nl
- Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
- Ricardo CorinFaMAFVerified email at famaf.unc.edu.ar
- Emmanuele ZambonEindhoven University of TechnologyVerified email at tue.nl
- Damiano BolzoniUniversity of TwenteVerified email at utwente.nl
- Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
- Maurizio GabbrielliProfessor of Computer Science, University of BolognaVerified email at cs.unibo.it
- Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
- Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
- Paul Havingaprofessor of Computer Science, University of Twente / TNOVerified email at utwente.nl
- Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
- Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
- Giorgio DelzannoAssociate Professor, Universitą di GenovaVerified email at unige.it
- Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- Krzysztof R. AptCWI fellow, CWI , The NetherlandsVerified email at cwi.nl
- Jim Alves-FossDirector, Center for Secure & Dependable Sys. and Professor of Computer Science, Univ. of IdahoVerified email at uidaho.edu
- Bruno CrispoProfessor of Computer Science, University of Trento, Italy