Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Antonino SabettaSAP Security ResearchVerified email at sap.com
- Slim TRABELSISAP, EurecomVerified email at sap.com
- Franco BagnoliUniversità di FirenzeVerified email at unifi.it
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Ernesto DamianiKhalifa UniversityVerified email at ku.ac.ae
- thierry nieusUniversità di MilanoVerified email at unimi.it
- Claudio ArdagnaRicercatore, Università degli Studi di MilanoVerified email at unimi.it
- Samuel Paul KaluvuriLeocornoVerified email at leocorno.com
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- Angelo ArleoInstitute of Vision, CNRS INSERM UPMC, Paris, FranceVerified email at inserm.fr
- Cedric HebertSAP Security ResearchVerified email at sap.com
- Stefano RuffoSISSAVerified email at sissa.it
- Giovanni LivragaComputer Science Department, Universita' degli Studi di MilanoVerified email at unimi.it
- Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
- Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
- Andrea CilibertoIFOM - Istituto FIRC di Oncologia MolecolareVerified email at ifom.eu
- Alessandro TrevesSISSA, Oxford, Jerusalem, Roma, +TrondheimVerified email at sissa.it
- Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
- S MizumoriProfessor of Psychology, University of WashingtonVerified email at uw.edu
- Sara ForestiUniversita' degli Studi di MilanoVerified email at unimi.it