Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
- Stephan KrennAIT Austrian Institute of Technology GmbHEmail verificata su ait.ac.at
- David DerlerDFINITYEmail verificata su dfinity.org
- Dennis HofheinzDepartment of Computer Science, ETH ZürichEmail verificata su inf.ethz.ch
- Sebastian RamacherScientist, AIT Austrian Institute of TechnologyEmail verificata su ait.ac.at
- Thomas LoruenserSenior Scientist, AIT Austrian Institute of TechnologyEmail verificata su ait.ac.at
- Tibor JagerUniversity of WuppertalEmail verificata su uni-wuppertal.de
- Kai SamelinDZ HypEmail verificata su dzhyp.de
- Kenny PatersonProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Kai GellertUniversity of WuppertalEmail verificata su uni-wuppertal.de
- Erkan TairiTU WienEmail verificata su tuwien.ac.at
- Jae Hong SeoAssociate Professor, Hanyang UniversityEmail verificata su hanyang.ac.kr
- Peter ChvojkaPhD Student, University of WuppertalEmail verificata su uni-wuppertal.de
- Simone Fischer-HübnerProfessor, Karlstad UniversityEmail verificata su kau.se
- Vasenev AlexandrResearcherEmail verificata su utwente.nl
- Fabian EidensPaderborn UniversityEmail verificata su uni-paderborn.de
- Jan BobolzUniversity of EdinburghEmail verificata su jan-bobolz.de
- Abida Haqueassistant teaching professor, North Carolina State UniversityEmail verificata su ncsu.edu
- Paul RöslerFAU Erlangen-NürnbergEmail verificata su fau.de
- Stefan MarksteinerTechnology Scout Cyber Security, AVL List GmbHEmail verificata su avl.com