Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Gomez LaurentSAP Security ResearchVerified email at sap.com
Niranjan SuriUS Army Research Laboratory (ARL) and Florida Institute for Human & Machine Cognition (IHMC)Verified email at ihmc.us
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Silvio RaniseFBKVerified email at fbk.eu
Attaullah BuriroAssistant Professor @ University of Bolzano, Italy,Verified email at unibz.it
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Filippo Del FrariUniversity of TrentoVerified email at unitn.it
Vincenzo PellegriniUniversity of Pisa - ItalyVerified email at idscorporation.com
Michał DykMilitary University of TechnologyVerified email at wat.edu.pl
Cedric HebertSAP Security ResearchVerified email at sap.com
Frederic MontagutAvaloq Evolution AGVerified email at eurecom.fr
Marcin SzpyrkaAGH University of KrakowVerified email at agh.edu.pl
Bartosz JasiulNATO Communications and Information AgencyVerified email at ncia.nato.int
Krzysztof GierłowskiPolitechnika GdańskaVerified email at eti.pg.gda.pl
Gabriele CostaIMT LuccaVerified email at imtlucca.it
Luca VerderameUniversità degli Studi di GenovaVerified email at unige.it
Alessio MerloFull Professor of Computer Engineering, School for Advanced Defense Studies (CASD), Rome, ItalyVerified email at ieee.org
Annett LaubeProfessor of Computer Science / Head of Institute for ICT Based Management, Bern University of Applied SciencesVerified email at bfh.ch
Refik MolvaProfessor EURECOMVerified email at eurecom.fr
David SimplotInriaVerified email at inria.fr