Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marco MelliaPolitecnico di Torino, italyVerified email at polito.it
Luca De CiccoAssociate Professor at Politecnico di BariVerified email at poliba.it
Aiko PrasProfessor of Computer Science, University of TwenteVerified email at utwente.nl
Elena BaralisFull Professor, Computer engineering, Politecnico di Torino, ItalyVerified email at polito.it
Gaspar Modelo-HowardData Scientist (Security), Palo Alto NetworksVerified email at acm.org
Luigi GrimaudoPolitecnico di TorinoVerified email at polito.it
Sung-Ju LeeKAISTVerified email at kaist.ac.kr
Alessandro FinamoreHuawei Technologies, FranceVerified email at huawei.com
Stanislav MiskovicSymantecVerified email at symantec.com
Hassan MetwalleyPolitecnico di TorinoVerified email at polito.it
Andrea MorichettaUniversity Assistant (Postdoc), TU Wien (Distributed System Group)Verified email at dsg.tuwien.ac.at
Stefano TraversoErmes Cyber SecurityVerified email at polito.it
Maurizio M. Munafo'Assistant Professor, Department of Electronics and Communications, Politecnico di TorinoVerified email at polito.it
Ali safari khatouniShopifyVerified email at shopify.com
Sofiane SarniSwiss Data Science Center, EPFL and ETHZVerified email at epfl.ch
Dario RossiScientific Director at Huawei, Former Professor at Telecom ParisTech & Ecole Polytechnique
Sabyasachi SahaPrincipal Engineer