Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Alexander PretschnerProfessor of Computer Science, Technische Universität MünchenEmail verificata su in.tum.de
- Juan David Guarnizo HernandezPostDoc at ETHZEmail verificata su inf.ethz.ch
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Jesús SolanoETH ZürichEmail verificata su inf.ethz.ch
- Flavio ToffaliniEPFL, HexHive LaboratoryEmail verificata su epfl.ch
- John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchEmail verificata su hitachienergy.com
- Jan JürjensUniversität Koblenz-Landau, GermanyEmail verificata su jurjens.de
- Ivan HomoliakAssistant Professor, Brno University of TechnologyEmail verificata su fit.vutbr.cz
- Lizzy TenganaAalto UniversityEmail verificata su aalto.fi
- Esteban RiveraInstitute for Automotive Engineering, TUMEmail verificata su tum.de
- Chuadhry Mujeeb AhmedNewcastle UniversityEmail verificata su newcastle.ac.uk
- Sebastian BanescuQuantstampEmail verificata su quantstamp.com
- Alejandra CastelblancoPhD Candidate, TUM and Helmholtz Center MunichEmail verificata su helmholtz-muenchen.de
- Andrei SabelfeldChalmers University of TechnologyEmail verificata su chalmers.se
- Boris KöpfAzure Research, MicrosoftEmail verificata su microsoft.com
- Sudipta ChattopadhyayAssociate Professor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Jorge CuellarUni Passau, Univ de los Andes (Bogota)Email verificata su gw.uni-passau.de
- Ruben RiosAssociate Professor, NICS Lab - University of MálagaEmail verificata su lcc.uma.es
- Gilles BartheMPI-SP and IMDEA Software InstituteEmail verificata su mpi-sp.org