Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Antonino SabettaSAP Security ResearchVerified email at sap.com
Slim TRABELSISAP, EurecomVerified email at sap.com
Franco BagnoliUniversità di FirenzeVerified email at unifi.it
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Claudio ArdagnaRicercatore, Università degli Studi di MilanoVerified email at unimi.it
Ernesto DamianiKhalifa UniversityVerified email at ku.ac.ae
thierry nieusUniversità di MilanoVerified email at unimi.it
Samuel Paul KaluvuriLeocornoVerified email at leocorno.com
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Angelo ArleoInstitute of Vision, CNRS INSERM UPMC, Paris, FranceVerified email at inserm.fr
Cedric HebertSAP Security ResearchVerified email at sap.com
Stefano RuffoInstitute for Complex Systems CNR Sesto Fiorentino ItalyVerified email at sissa.it
Giovanni LivragaComputer Science Department, Universita' degli Studi di MilanoVerified email at unimi.it
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
Andrea CilibertoIFOM - Istituto FIRC di Oncologia MolecolareVerified email at ifom.eu
Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurVerified email at i3s.unice.fr
Alessandro TrevesSISSA, Oxford, Jerusalem, Roma, +Trondheim, AgderVerified email at sissa.it
S MizumoriProfessor of Psychology, University of WashingtonVerified email at uw.edu
Sara ForestiUniversita' degli Studi di MilanoVerified email at unimi.it