Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Emmanuele ZambonEindhoven University of TechnologyVerified email at tue.nl
Pernul GüntherProfessor für Wirtschaftsinformatik, Universität RegensburgVerified email at wiwi.uni-regensburg.de
Daniel SchletteResearcher, University of RegensburgVerified email at ur.de
Emiliano CasalicchioSapienza University of Rome - Computer Science Dep.Verified email at uniroma1.it
Herson Esquivel-VargasInstituto Tecnológico de Costa RicaVerified email at itcr.ac.cr
Igor Nai FovinoJoint Research CentreVerified email at ec.europa.eu
Fabian BöhmInformation Security Consultant @ Q_PERIORVerified email at ur.de
Christin SeifertUniversity of Marburg / Hessian.AIVerified email at uni-marburg.de
Robin SommerCorelightVerified email at icsi.berkeley.edu
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Rick HofstedeUniversity of TwenteVerified email at utwente.nl
Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
Thijs van EdeAssistant Professor, University of TwenteVerified email at utwente.nl
Andrea ContinellaAssociate Professor at University of TwenteVerified email at utwente.nl
Jonathan PetitQualcommVerified email at qti.qualcomm.com
Asbat El KhairiPhD CandidateVerified email at utwente.nl
Vasileios MavroeidisAssociate Professor of Cybersecurity, University of OsloVerified email at ifi.uio.no