Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Daniel GrussGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Daniel GenkinGeorgia TechEmail verificata su gatech.edu
- Yuval YaromRuhr University BochumEmail verificata su rub.de
- Stefan MangardGraz University of TechnologyEmail verificata su tugraz.at
- Clémentine MauriceUniv Lille, CNRS, InriaEmail verificata su inria.fr
- Daniel MoghimiSenior Research Scientist, GoogleEmail verificata su google.com
- Claudio CanellaAmazon Web ServicesEmail verificata su amazon.com
- Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsEmail verificata su gdata-adan.de
- Jo Van Bulckimec-DistriNet, KU LeuvenEmail verificata su cs.kuleuven.be
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Berk SunarWorcester Polytechnic InstituteEmail verificata su wpi.edu
- Andreas KoglerGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Marina MinkinUniversity of MichiganEmail verificata su umich.edu
- Raphael SpreitzerSGSEmail verificata su sgs.com
- Martin SchwarzlGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Julian StecklinaEngineer at Cyberus TechnologyEmail verificata su os.inf.tu-dresden.de
- Jonas JuffingerGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Dmitry EvtyushkinAssistant Professor, William & MaryEmail verificata su wm.edu
- Robert SchillingGraz University of TechnologyEmail verificata su iaik.tugraz.at