Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
- Alessandro CimattiFondazione Bruno KesslerVerified email at fbk.eu
- Marco BozzanoFondazione Bruno KesslerVerified email at fbk.eu
- Roberto BruttomessoExpert Researcher and Software EngineerVerified email at atrenta.com
- Roberto SebastianiFull Professor in Computer Science, DISI, University of Trento, ItalyVerified email at unitn.it
- Tommi JunttilaAalto UniversityVerified email at aalto.fi
- Roel VerdultFactorIT BVVerified email at factorit.nl
- Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl
- Miguel E. AndresGoogle Inc, Ecole Polytechnique, Radboud UniversityVerified email at lix.polytechnique.fr
- Stephan SchulzProfessor of Computer Science, DHBW StuttgartVerified email at eprover.org
- Gerhard de Koning GansFactorIT BVVerified email at factorit.nl
- Catuscia PalamidessiInriaVerified email at lix.polytechnique.fr
- Silvio RaniseFBKVerified email at fbk.eu
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
- Ana SokolovaAssociate Professor at University of SalzburgVerified email at cs.uni-salzburg.at
- Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
- Ichiro HasuoProfessor of Computer Science, National Institute of InformaticsVerified email at acm.org
- Erik PollRadboud University NijmegenVerified email at cs.ru.nl
- Pedro R. D'ArgenioFaMAF, Universidad Nacional de Córdoba - CONICETVerified email at famaf.unc.edu.ar
- Geoffrey SmithSchool of Computing and Information Sciences, Florida International UniversityVerified email at cis.fiu.edu