Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Niranjan SuriUS Army Research Laboratory (ARL) and Florida Institute for Human & Machine Cognition (IHMC)Verified email at ihmc.us
Gomez LaurentSAP Security ResearchVerified email at sap.com
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Silvio RaniseFBKVerified email at fbk.eu
Attaullah BuriroAssistant Professor @ University of Ca Foscari, Venezia, Italy,Verified email at unive.it
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Vincenzo PellegriniUniversity of Pisa - ItalyVerified email at idscorporation.com
Michał DykMilitary University of TechnologyVerified email at wat.edu.pl
Filippo Del FrariUniversity of TrentoVerified email at unitn.it
Frederic MontagutAvaloq Evolution AGVerified email at eurecom.fr
Cedric HebertSAP Security ResearchVerified email at sap.com
Marcin SzpyrkaAGH University of KrakowVerified email at agh.edu.pl
Bartosz JasiulNATO Communications and Information AgencyVerified email at ncia.nato.int
Krzysztof SzczypiorskiWarsaw University of Technology, PolandVerified email at pw.edu.pl
Krzysztof GierłowskiPolitechnika GdańskaVerified email at eti.pg.gda.pl
Gabriele CostaIMT LuccaVerified email at imtlucca.it
Annett LaubeProfessor of Computer Science / Head of Institute for ICT Based Management, Bern University of Applied SciencesVerified email at bfh.ch
Refik MolvaProfessor EURECOMVerified email at eurecom.fr
Luca VerderameUniversità degli Studi di GenovaVerified email at unige.it
Alessio MerloFull Professor of Computer Engineering, School for Advanced Defense Studies (CASD), Rome, ItalyVerified email at ssuos.difesa.it