Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Georg CarleTechnische Universität MünchenEmail verificata su net.in.tum.de
- Oliver GasserMax Planck Institute for InformaticsEmail verificata su mpi-inf.mpg.de
- Lexi BrentGoogleEmail verificata su google.com
- Yaron ShefferIntuitEmail verificata su intuit.com
- Quirin ScheitleTechnical University of Munich (TUM)Email verificata su net.in.tum.de
- Paul RimbaData61, CSIROEmail verificata su data61.csiro.au
- Vincent GramoliUniversity of Sydney and EPFLEmail verificata su sydney.edu.au
- Andrea ContinellaAssociate Professor at University of TwenteEmail verificata su utwente.nl
- Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteEmail verificata su utwente.nl
- Alexander PonomarevData61, CSIROEmail verificata su data61.csiro.au
- Ingo WeberProfessor at TU Munich (Computer Science), Director at FraunhoferEmail verificata su tum.de
- An Binh TranData61, CSIROEmail verificata su data61.csiro.au
- Oliver HohlfeldUniversity of KasselEmail verificata su ohohlfeld.com
- Jens HillerRWTH Aachen UniversityEmail verificata su comsys.rwth-aachen.de
- Fabian P. HeldInterdisciplinary Senior Lecturer, The University of SydneyEmail verificata su sydney.edu.au
- Bernhard ScholzThe University of SydneyEmail verificata su sydney.edu.au
- François GauthierSenior Principal Researcher, Oracle LabsEmail verificata su oracle.com
- Lothar BraunAugsburg University of Applied SciencesEmail verificata su hs-augsburg.de
- Mark StaplesData61, CSIROEmail verificata su data61.csiro.au
- Ernst BiersackEmail verificata su eurecom.fr