Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
- Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
- Emmanuele ZambonEindhoven University of TechnologyVerified email at tue.nl
- Pernul GüntherProfessor für Wirtschaftsinformatik, Universität RegensburgVerified email at wiwi.uni-regensburg.de
- Daniel SchletteResearcher, University of RegensburgVerified email at ur.de
- Emiliano CasalicchioSapienza University of Rome - Computer Science Dep.Verified email at uniroma1.it
- Herson Esquivel-VargasInstituto Tecnológico de Costa RicaVerified email at itcr.ac.cr
- Igor Nai FovinoJoint Research CentreVerified email at ec.europa.eu
- Fabian BöhmInformation Security Consultant @ Q_PERIORVerified email at ur.de
- Christin SeifertUniversity of Marburg / Hessian.AIVerified email at uni-marburg.de
- Robin SommerCorelightVerified email at icsi.berkeley.edu
- Andrea ContinellaAssociate Professor at University of TwenteVerified email at utwente.nl
- Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
- Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
- Rick HofstedeUniversity of TwenteVerified email at utwente.nl
- Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
- Thijs van EdeAssistant Professor, University of TwenteVerified email at utwente.nl
- Jonathan PetitQualcommVerified email at qti.qualcomm.com
- Asbat El KhairiPhD CandidateVerified email at utwente.nl
- Vasileios MavroeidisAssociate Professor of Cybersecurity, University of OsloVerified email at ifi.uio.no