Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Alexander PretschnerProfessor of Computer Science, Technische Universität MünchenVerified email at in.tum.de
- Juan David Guarnizo HernandezPostDoc at ETHZVerified email at inf.ethz.ch
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Jesús SolanoETH ZürichVerified email at inf.ethz.ch
- Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
- John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchVerified email at hitachienergy.com
- Jan JürjensUniversität Koblenz-Landau, GermanyVerified email at jurjens.de
- Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
- Lizzy TenganaAalto UniversityVerified email at aalto.fi
- Esteban RiveraInstitute for Automotive Engineering, TUMVerified email at tum.de
- Chuadhry Mujeeb AhmedNewcastle UniversityVerified email at newcastle.ac.uk
- Sebastian BanescuQuantstampVerified email at quantstamp.com
- Alejandra CastelblancoPhD Candidate, TUM and Helmholtz Center MunichVerified email at helmholtz-muenchen.de
- Andrei SabelfeldChalmers University of TechnologyVerified email at chalmers.se
- Boris KöpfAzure Research, MicrosoftVerified email at microsoft.com
- Sudipta ChattopadhyayAssociate Professor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Jorge CuellarUni Passau, Univ de los Andes (Bogota)Verified email at gw.uni-passau.de
- Ruben RiosAssociate Professor, NICS Lab - University of MálagaVerified email at lcc.uma.es
- Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org