Get my own profile
Public access
View all17 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Stefan RassFull Professor, LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, AustriaVerified email at jku.at
- Stefan SchauerAIT Austrian Institute of TechnologyVerified email at ait.ac.at
- Antonios GouglidisAssociate Professor, Lancaster UniversityVerified email at lancaster.ac.uk
- Quanyan ZhuDepartment of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
- Manos PanaousisProfessor of Cyber Security, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
- Ali AlshawishChair of Computer Networks and Computer Communications, University of PassauVerified email at uni-passau.de
- Christoph SchmittnerScientist, AIT Austrian Instituit of TechnologyVerified email at ait.ac.at
- Michalis PavlidisPrincipal Lecturer in Cyber Security, University of BrightonVerified email at brighton.ac.uk
- David HutchisonEmeritus Professor, Lancaster UniversityVerified email at lancaster.ac.uk
- Haralambos MouratidisDirector, Institute for Analytics and Data Science (IADS), University of EssexVerified email at essex.ac.uk
- Mohamed Amine AbidUniversity of PassauVerified email at uni-passau.de
- Klaus SteinnocherSenior Scientist, Austrian Institute of TechnologyVerified email at ait.ac.at
- Andrea PferscherPostdoctoral Research Fellow, Department of Informatics, University of OsloVerified email at ifi.uio.no
- Paul SmithAIT Austrian Institute of TechnologyVerified email at ait.ac.at
- Peter MayerSenior Researcher, Applied Assistive Technologies, Inst. for Design and Assessment of Technology, TU ViennaVerified email at fortec.tuwien.ac.at