Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Daniel GrussGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Moritz LippEmail verificata su mlq.me
- Lukas GinerGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Jo Van Bulckimec-DistriNet, KU LeuvenEmail verificata su cs.kuleuven.be
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Daniel MoghimiSenior Research Scientist, GoogleEmail verificata su google.com
- Berk SunarWorcester Polytechnic InstituteEmail verificata su wpi.edu
- Andreas KoglerGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Dmitry EvtyushkinAssistant Professor, William & MaryEmail verificata su wm.edu
- Philipp OrtnerTechnische Universität BerlinEmail verificata su tu-berlin.de
- Benjamin von BergGraz University of TechnologyEmail verificata su tugraz.at
- Robert SchillingGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Martin SchwarzlGraz University of TechnologyEmail verificata su iaik.tugraz.at
- David OswaldSecurity and Privacy Group, University of BirminghamEmail verificata su bham.ac.uk
- Catherine EasdonDynatrace ResearchEmail verificata su dynatrace.com
- Khaled N. KhasawnehAssistant Professor, George Mason UniversityEmail verificata su gmu.edu
- Martin HaubenwallnerGraz University of TechnologyEmail verificata su student.tugraz.at
- Mario WernerGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Dimitrios SkarlatosComputer Science Department, Carnegie Mellon UniversityEmail verificata su cs.cmu.edu