Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Alessandro CimattiFondazione Bruno KesslerVerified email at fbk.eu
Marco BozzanoFondazione Bruno KesslerVerified email at fbk.eu
Roberto BruttomessoExpert Researcher and Software EngineerVerified email at atrenta.com
Roberto SebastianiFull Professor in Computer Science, DISI, University of Trento, ItalyVerified email at unitn.it
Tommi JunttilaAalto UniversityVerified email at aalto.fi
Roel VerdultFactorIT BVVerified email at factorit.nl
Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl
Miguel E. AndresGoogle Inc, Ecole Polytechnique, Radboud UniversityVerified email at lix.polytechnique.fr
Stephan SchulzProfessor of Computer Science, DHBW StuttgartVerified email at eprover.org
Gerhard de Koning GansFactorIT BVVerified email at factorit.nl
Catuscia PalamidessiInriaVerified email at lix.polytechnique.fr
Silvio RaniseFBKVerified email at fbk.eu
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Ana SokolovaAssociate Professor at University of SalzburgVerified email at cs.uni-salzburg.at
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Ichiro HasuoProfessor of Computer Science, National Institute of InformaticsVerified email at acm.org
Erik PollRadboud University NijmegenVerified email at cs.ru.nl
Pedro R. D'ArgenioFaMAF, Universidad Nacional de Córdoba - CONICETVerified email at famaf.unc.edu.ar
Geoffrey SmithSchool of Computing and Information Sciences, Florida International UniversityVerified email at cis.fiu.edu