Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Georg CarleTechnische Universität MünchenVerified email at net.in.tum.de
Oliver GasserIPinfoVerified email at ipinfo.io
Lexi BrentGoogleVerified email at google.com
Yaron ShefferIntuitVerified email at intuit.com
Quirin ScheitleTechnical University of Munich (TUM)Verified email at net.in.tum.de
Paul RimbaData61, CSIROVerified email at data61.csiro.au
Vincent GramoliUniversity of Sydney and EPFLVerified email at sydney.edu.au
Andrea ContinellaAssociate Professor at University of TwenteVerified email at utwente.nl
Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
Alexander PonomarevData61, CSIROVerified email at data61.csiro.au
Ingo WeberProfessor at TU Munich (Computer Science), Director at FraunhoferVerified email at tum.de
An Binh TranData61, CSIROVerified email at data61.csiro.au
Anna SperottoProfessor, University of TwenteVerified email at utwente.nl
Oliver HohlfeldUniversity of KasselVerified email at ohohlfeld.com
Jens HillerRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Quinn GrundyFaculty of Nursing, University of TorontoVerified email at utoronto.ca
Fabian P. HeldInterdisciplinary Senior Lecturer, The University of SydneyVerified email at sydney.edu.au
Mattijs JonkerUniversity of TwenteVerified email at utwente.nl
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Bernhard ScholzThe University of SydneyVerified email at sydney.edu.au