Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Antonio MañaProfessor of Computer Science, University of MalagaVerified email at lcc.uma.es
- Javier LopezProfessor of Computer Science, University of MalagaVerified email at lcc.uma.es
- Hristo KoshutanskiAtos Research & Innovation, SpainVerified email at atos.net
- Carsten RudolphMonash University, Melbourne, AustraliaVerified email at monash.edu
- Carmen Fernandez GagoUniversity of Malaga (Spain)Verified email at lcc.uma.es
- Ana Checa-RosClinician and Researcher in Paediatrics, University of GranadaVerified email at correo.ugr.es
- Luca CompagnaSAP Security ResearchVerified email at sap.com
- Jamal ToutouhMassachusetts Institute of Technology (MIT)Verified email at mit.edu
- George SpanoudakisProfessor, City University LondonVerified email at city.ac.uk
- Eamonn PowerCTO, Telenostic Ltd.Verified email at telenostic.com
- Marcos ArjonaTechnical Research Assistant, University of MalagaVerified email at lcc.uma.es
- Jose Fran. RuizAtosVerified email at atos.net
- Sergio NesmachnowFull Professor, Universidad de la República, UruguayVerified email at fing.edu.uy
- Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
- Raian AliProfessor, HBKU, QatarVerified email at hbku.edu.qa
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
- Javier GonzálezMicrosoft Research CambridgeVerified email at microsoft.com