Get my own profile
Public access
View all80 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Luca AllodiEindhoven University of TechnologyVerified email at tue.nl
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
Olga GadyatskayaAssociate professor at LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Nicola DragoniDeputy Director, Head of Section, Professor @ DTU ComputeVerified email at dtu.dk
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Julian WilliamsProfessor of Accounting and Finance, Durham UniversityVerified email at durham.ac.uk
Antonino SabettaSAP Security ResearchVerified email at sap.com
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Duc-Ly VuLecturer at Eastern International UniversityVerified email at eiu.edu.vn
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Nataliia BielovaResearch Scientist at Inria (ex-CNIL)Verified email at inria.fr
Ida SiahaanChair of Automata Theory - TU DresdenVerified email at tu-dresden.de
Artsiom YautsiukhinIIT-CNRVerified email at iit.cnr.it
Woohyun ShimKorea Institute of Public AdministrationVerified email at kipa.re.kr
Lawrence PaulsonUniversity of CambridgeVerified email at cam.ac.uk