Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Marco MelliaPolitecnico di Torino, italyVerified email at polito.it
- Luca De CiccoAssociate Professor at Politecnico di BariVerified email at poliba.it
- Aiko PrasProfessor of Computer Science, University of TwenteVerified email at utwente.nl
- Elena BaralisFull Professor, Computer engineering, Politecnico di Torino, ItalyVerified email at polito.it
- Gaspar Modelo-HowardData Scientist (Security), Palo Alto NetworksVerified email at acm.org
- Luigi GrimaudoPolitecnico di TorinoVerified email at polito.it
- Sung-Ju LeeKAISTVerified email at kaist.ac.kr
- Alessandro FinamoreHuawei Technologies, FranceVerified email at huawei.com
- Hassan MetwalleyPolitecnico di TorinoVerified email at polito.it
- Andrea MorichettaUniversity Assistant (Postdoc), TU Wien (Distributed System Group)Verified email at dsg.tuwien.ac.at
- Stanislav MiskovicSymantecVerified email at symantec.com
- Stefano TraversoErmes Cyber SecurityVerified email at polito.it
- Maurizio M. Munafo'Assistant Professor, Department of Electronics and Communications, Politecnico di TorinoVerified email at polito.it
- Ali safari khatouniShopifyVerified email at shopify.com
- Sofiane SarniSwiss Data Science Center, EPFL and ETHZVerified email at epfl.ch
- Dario RossiScientific Director at Huawei, Former Professor at Telecom ParisTech & Ecole Polytechnique
- Sabyasachi SahaPrincipal Engineer