Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Antonino SabettaSAP Security ResearchVerified email at sap.com
Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
Michele BezziSAP Security ResearchVerified email at sap.com
Matias MartinezUniversitat Politècnica de Catalunya-BarcelonaTechVerified email at upc.edu
Piergiorgio LadisaSAP Security Research, Université de Rennes 1, Inria, IRISAVerified email at sap.com
Olivier BaraisUniversity of Rennes / IRISA / INRIAVerified email at irisa.fr
Duc-Ly VuLecturer at Eastern International UniversityVerified email at eiu.edu.vn
Slim TRABELSISAP, EurecomVerified email at sap.com
Marc OhmUniversity of Bonn and Fraunhofer FKIEVerified email at cs.uni-bonn.de
Matteo CasalinoAmadeusVerified email at amadeus.com
Cedric HebertSAP Security ResearchVerified email at sap.com
Anis Zouaouiprofesseur d'informatique, EspritVerified email at esprit.tn
Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
Mohammad Ashiqur RahamanSAP, SAP Security ResearchVerified email at sap.com
Prof. Dr. Andreas SchaadUniversity of Applied Sciences OffenburgVerified email at hs-offenburg.de
Ben HermannProfessor for Secure Software Enginnering at Technische Universität DortmundVerified email at cs.tu-dortmund.de
Eric BoddenProfessor for Software Engineering at Heinz Nixdorf Institute, Paderborn University & Fraunhofer IEMVerified email at uni-paderborn.de
Andreas DannVerified email at andreasdann.eu