Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Frank KarglProfessor of Computer Science, Ulm UniversityEmail verificata su uni-ulm.de
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyEmail verificata su uol.de
- Emmanuele ZambonEindhoven University of TechnologyEmail verificata su tue.nl
- Pernul GüntherProfessor für Wirtschaftsinformatik, Universität RegensburgEmail verificata su wiwi.uni-regensburg.de
- Daniel SchletteResearcher, University of RegensburgEmail verificata su ur.de
- Emiliano CasalicchioSapienza University of Rome - Computer Science Dep.Email verificata su uniroma1.it
- Herson Esquivel-VargasInstituto Tecnológico de Costa RicaEmail verificata su itcr.ac.cr
- Igor Nai FovinoJoint Research CentreEmail verificata su ec.europa.eu
- Fabian BöhmInformation Security Consultant @ Q_PERIOREmail verificata su ur.de
- Robin SommerCorelightEmail verificata su icsi.berkeley.edu
- Christin SeifertUniversity of Marburg / Hessian.AIEmail verificata su uni-marburg.de
- Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsEmail verificata su utwente.nl
- Pieter HartelProfessor Emeritus Cyber securityEmail verificata su tudelft.nl
- Rick HofstedeUniversity of TwenteEmail verificata su utwente.nl
- Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteEmail verificata su utwente.nl
- Thijs van EdeAssistant Professor, University of TwenteEmail verificata su utwente.nl
- Jonathan PetitQualcommEmail verificata su qti.qualcomm.com
- Andrea ContinellaAssociate Professor at University of TwenteEmail verificata su utwente.nl
- Asbat El KhairiPhD CandidateEmail verificata su utwente.nl
- Justyna ChromikPhD candidate, University of TwenteEmail verificata su utwente.nl