Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Antonino SabettaSAP Security ResearchVerified email at sap.com
- Ivan PashchenkoResearch Assistant Professor, University of TrentoVerified email at unitn.it
- Fabio MassacciChair at Vrije Universiteit, Netherlands and prof. at University of Trento, ItalyVerified email at ieee.org
- Michele BezziSAP Security ResearchVerified email at sap.com
- Matias MartinezUniversitat Politècnica de Catalunya-BarcelonaTechVerified email at upc.edu
- Piergiorgio LadisaSAP Security Research, Université de Rennes 1, Inria, IRISAVerified email at sap.com
- Olivier BaraisUniversity of Rennes / IRISA / INRIAVerified email at irisa.fr
- Duc-Ly VuLecturer at Eastern International UniversityVerified email at eiu.edu.vn
- Slim TRABELSISAP, EurecomVerified email at sap.com
- Matteo CasalinoAmadeusVerified email at amadeus.com
- Marc OhmUniversity of Bonn and Fraunhofer FKIEVerified email at cs.uni-bonn.de
- Cedric HebertSAP Security ResearchVerified email at sap.com
- Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
- Mohammad Ashiqur RahamanSAP, SAP Security ResearchVerified email at sap.com
- Prof. Dr. Andreas SchaadUniversity of Applied Sciences OffenburgVerified email at hs-offenburg.de
- Anis Zouaouiprofesseur d'informatique, EspritVerified email at esprit.tn
- Ben HermannProfessor for Secure Software Enginnering at Technische Universität DortmundVerified email at cs.tu-dortmund.de
- Eric BoddenProfessor for Software Engineering at Heinz Nixdorf Institute, Paderborn University & Fraunhofer IEMVerified email at uni-paderborn.de
- Stefano ParaboschiProfessor of Computer Science and Engineering, Università degli Studi di Bergamo, ItalyVerified email at unibg.it