Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Niranjan SuriUS Army Research Laboratory (ARL) and Florida Institute for Human & Machine Cognition (IHMC)Verified email at ihmc.us
- Gomez LaurentSAP Security ResearchVerified email at sap.com
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- Silvio RaniseFBKVerified email at fbk.eu
- Attaullah BuriroAssistant Professor @ University of Ca Foscari, Venezia, Italy,Verified email at unive.it
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Vincenzo PellegriniUniversity of Pisa - ItalyVerified email at idscorporation.com
- Michał DykMilitary University of TechnologyVerified email at wat.edu.pl
- Filippo Del FrariUniversity of TrentoVerified email at unitn.it
- Frederic MontagutAvaloq Evolution AGVerified email at eurecom.fr
- Cedric HebertSAP Security ResearchVerified email at sap.com
- Marcin SzpyrkaAGH University of KrakowVerified email at agh.edu.pl
- Bartosz JasiulNATO Communications and Information AgencyVerified email at ncia.nato.int
- Krzysztof SzczypiorskiWarsaw University of Technology, PolandVerified email at pw.edu.pl
- Krzysztof GierłowskiPolitechnika GdańskaVerified email at eti.pg.gda.pl
- Gabriele CostaIMT LuccaVerified email at imtlucca.it
- Annett LaubeProfessor of Computer Science / Head of Institute for ICT Based Management, Bern University of Applied SciencesVerified email at bfh.ch
- Refik MolvaProfessor EURECOMVerified email at eurecom.fr
- Luca VerderameUniversità degli Studi di GenovaVerified email at unige.it
- Alessio MerloFull Professor of Computer Engineering, School for Advanced Defense Studies (CASD), Rome, ItalyVerified email at ssuos.difesa.it