Crea il mio profilo
Accesso pubblico
Visualizza tutto35 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Alexandra DmitrienkoWürzburg UniversityEmail verificata su uni-wuerzburg.de
- Christopher LiebchenTechnische Universität DarmstadtEmail verificata su google.com
- Marcel WinandySenior Expert Cyber Security Architect at E.ONEmail verificata su eon.com
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- N. AsokanProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Per LarsenImmunant, Inc.Email verificata su immunant.com
- Dr. Stephen CraneImmunant Inc.Email verificata su uci.edu
- Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyEmail verificata su ece.gatech.edu
- Stephan HeuserIntelEmail verificata su heuser.ws
- Sven BugielCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- stefan brunthalerProfessor, Secure Software Engineering @ CODE National Research InstituteEmail verificata su unibw.de
- Yier JinAssociate Professor, University of FloridaEmail verificata su ece.ufl.edu
- Dean SullivanUniversity of New HampshireEmail verificata su unh.edu
- Stefan NürnbergerELEXIR AGEmail verificata su elexir.eu
- Andrew PaverdMicrosoftEmail verificata su microsoft.com
- Ralf HundRuhr-Universität BochumEmail verificata su rub.de
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatEmail verificata su ics.uci.edu
- Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityEmail verificata su nyu.edu
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleEmail verificata su math.unipd.it