Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jun PangUniversity of LuxembourgEmail verificata su uni.lu
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgEmail verificata su uni.lu
- Naipeng DongThe University of QueenslandEmail verificata su uq.edu.au
- Benjamin Krumnowd-fineEmail verificata su th-koeln.de
- Christof Ferreira TorresPostdoctoral Researcher, ETH ZurichEmail verificata su inf.ethz.ch
- Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenEmail verificata su ru.nl
- Pascal LafourcadeUniversité Clermont AuvergneEmail verificata su uca.fr
- Jannik DreierLORIA, Université de Lorraine, TELECOM NancyEmail verificata su loria.fr
- Melanie VolkamerKarlsruher Institut für TechnologieEmail verificata su kit.edu
- Robert NorvillUniversity of LuxembourgEmail verificata su uni.lu
- Vincent van der MeerZuyd University of Applied SciencesEmail verificata su zuyd.nl
- Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Email verificata su saarlb.de
- Erik P. de VinkAssociate Professor, Eindhoven University of TechnologyEmail verificata su win.tue.nl
- Beltran Borja Fiz PontiverosUniversity of LuxembourgEmail verificata su uni.lu
- Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitEmail verificata su cs.ru.nl
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyEmail verificata su surrey.ac.uk
- James HeatherSenior Lecturer in Computing, University of SurreyEmail verificata su surrey.ac.uk
- Peter RyanProfessor of applied security, university of luxembourgEmail verificata su uni.lu
- Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Email verificata su unimelb.edu.au
- Harm van BeekSenior Digital Forensic Scientist, Netherlands Forensic InstituteEmail verificata su nfi.nl