Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Max MühlhäuserProfessor of Computer Science, Technische Universität DarmstadtEmail verificata su informatik.tu-darmstadt.de
- Dr. Sheikh Mahbub HabibHead of Cybersecurity and Privacy Innovation, Continental Automotive TechnologiesEmail verificata su continental-corporation.com
- Leonardo MartucciKarlstad universityEmail verificata su kau.se
- Jussi KangasharjuProfessor of Computer Science, University of HelsinkiEmail verificata su helsinki.fi
- Erwin AitenbichlerGoogleEmail verificata su aitenbichler.com
- Andreas HeinemannProfessor, Hochschule Darmstadt (h_da), GermanyEmail verificata su h-da.de
- Roksana BoreliPrincipal Consultant at TMPP Pty. Ltd.Email verificata su tmppbiz.com
- Hani AlzaidKing Abdulaziz City for Science and TechnologyEmail verificata su kacst.edu.sa
- Audun JøsangProfessor of Information Security, University of OsloEmail verificata su mn.uio.no
- Guido SchryenProfessor of Management Information Systems and Operations Research, Paderborn UniversityEmail verificata su upb.de
- Melanie VolkamerKarlsruher Institut für TechnologieEmail verificata su kit.edu
- Aruna SeneviratneProfessor of Telecommunications, University of New South WalesEmail verificata su unsw.edu.au
- Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyEmail verificata su tu-darmstadt.de
- Melanie HartmannEmail verificata su sebbweb.de
- Dirk Schnelle-WalkaConnected Car Division, Harman InternationalEmail verificata su jvoicexml.org
- Jürgen SteimleProfessor of Computer Science, Saarland University, Saarland Informatics CampusEmail verificata su mpi-inf.mpg.de
- Stephan BorgertEmail verificata su borgert.eu