Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mads DamProfessor of Teleinformatics, KTH - Royal Institute of TechnologyEmail verificata su kth.se
- Roberto GuancialeKTHEmail verificata su kth.se
- Hamed NematiKTH Royal Institute of TechnologyEmail verificata su kth.se
- Bernhard BeckertProfessor of Informatics, Karlsruhe Institute of TechnologyEmail verificata su kit.edu
- Jan Tobias MuehlbergResearcher in Computer Science, Universite Libre Bruxelles & KU Leuven, BelgiumEmail verificata su ulb.be
- Eddy TruyenResearch expert, K.U.LeuvenEmail verificata su cs.kuleuven.be
- Gerald BudigiriResearcherEmail verificata su kuleuven.be
- Sergey TverdyshevHUAWEIEmail verificata su huawei.com
- Christian GehrmannLund UniversityEmail verificata su eit.lth.se
- Gianluca ScopellitiKU Leuven, EricssonEmail verificata su ericsson.com
- Mats NäslundKTH, Royal Institute of TechnologyEmail verificata su kth.se
- Karl MeinkeProfessor of Computer Science KTH Royal Institute of TechnologyEmail verificata su kth.se
- Fredrik AsplundPh.D., KTH Royal Institute of TechnologyEmail verificata su kth.se
- DeJiu ChenAssociate Professor, KTH Royal Institute of TechnologyEmail verificata su kth.se
- Fritz AlderNVIDIAEmail verificata su nvidia.com
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- sepideh pouyanradPhd student, KU LeuvenEmail verificata su cs.kuleuven.be
- Narges KhakpourNewcastle UniversityEmail verificata su ncl.ac.uk
- Pablo BuirasKTH Royal Institute of TechnologyEmail verificata su kth.se
- Oliver SchwarzResearcher at RISE SICS
Segui
Christoph Baumann
Senior Researcher, Ericsson Security Research Sweden
Email verificata su ericsson.com