Crea il mio profilo
Accesso pubblico
Visualizza tutto52 articoli
22 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- John DerrickUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Brijesh DongolUniversity of SurreyEmail verificata su surrey.ac.uk
- Marie-Christine JakobsLMU MünchenEmail verificata su sosy.ifi.lmu.de
- Cedric RichterUniversity of OldenburgEmail verificata su uol.de
- Simon DohertyUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Arend RensinkProfessor in Computer Science, University of TwenteEmail verificata su utwente.nl
- Felix PauckPaderborn UniversityEmail verificata su foellix.de
- Oleg TravkinPhD Student, Universität PaderbornEmail verificata su zitmail.uni-paderborn.de
- Arnab SharmaUniversity of OldenburgEmail verificata su uni-oldenburg.de
- Christian SoltenbornResearch and Teaching AssistantEmail verificata su uni-paderborn.de
- Ernst-Ruediger OlderogProfessor für Informatik, Universität OldenburgEmail verificata su informatik.uni-oldenburg.de
- Wilhelm SchaeferProfessor für Informatik Universität PaderbornEmail verificata su upb.de
- Helen TreharneProfessor, Surrey Centre for Cyber SecurityEmail verificata su surrey.ac.uk
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyEmail verificata su surrey.ac.uk
- Gregor EngelsProfessor Computer Science, Paderborn University; Head SICP (Software Innovation Campus Paderborn)Email verificata su upb.de
- Michaela HuhnOstfalia, University of Applied Sciences, Computer Science FacultyEmail verificata su ostfalia.de
- Dirk BeyerProfessor of Computer Science, LMU Munich, GermanyEmail verificata su lmu.de
- Eyke HüllermeierProfessor of Computer Science, Paderborn UniversityEmail verificata su upb.de
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Klaus DrägerQueen Mary, University of LondonEmail verificata su qmul.ac.uk