Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
Luca SpalazziProfessor of Computer Science, Universitą Politecnica delle Marche, Ancona, ItalyVerified email at univpm.it
Alessandra CorneliUniversitą Politecnica delle MarcheVerified email at staff.univpm.it
Sasha RubinUniversity of SydneyVerified email at sydney.edu.au
Martin PinzgerProfessor of Software Engineering, Universität Klagenfurt, AustriaVerified email at aau.at
Giovanni LivaPhD in Software Engineering, University of Klagenfurt, AustriaVerified email at aau.at
Leonardo MessiPolytechnic University of MarcheVerified email at pm.univpm.it
Marco BaldiAssociate Professor in Telecommunications, Universitą Politecnica delle MarcheVerified email at univpm.it
Linda SenigagliesiUniversitą Politecnica delle MarcheVerified email at staff.univpm.it
Tomer KotekTU WienVerified email at forsyte.at
Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienVerified email at forsyte.tuwien.ac.at
Leonardo BinniPhD Student, Universitą Politecnica delle MarcheVerified email at pm.univpm.it
Salvatore CampanaCEO, XAUTOMATA TECHNOLOGYVerified email at xautomata.com
Florian ZulegerAssociate Professor, TU WienVerified email at forsyte.tuwien.ac.at
M. Taimoor KhanCentre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at gre.ac.uk
Andreas BollinUniv.-Prof. University of KlagenfurtVerified email at aau.at
Franco ChiaraluceUniversitą Politecnica delle MarcheVerified email at univpm.it
Massimiliano PiraniPegaso Telematic UniversityVerified email at unipegaso.it
Alberto GirettiProfessor of Model Engineering and Facility Management, Universitą Politecnica delle MarcheVerified email at univpm.it
Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
Josef WidderInformal SystemsVerified email at informal.systems