Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Johanna UllrichSBA ResearchVerified email at sba-research.org
Isao EchizenNational Institute of Informatics / University of Tokyo / SOKENDAIVerified email at nii.ac.jp
Yeoul NaApple IncVerified email at apple.com
Stijn VolckaertAssociate Professor, DistriNet, KU LeuvenVerified email at kuleuven.be
Georg MerzdovnikSBA ResearchVerified email at sba-research.org
Martin Schmiedecker (Mulazzani)Bosch Engineering GmbHVerified email at schmiedecker.net
David RupprechtRuhr-University BochumVerified email at rub.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
Matthew SmithProfessor of Computer Science, Universität BonnVerified email at cs.uni-bonn.de
Joseph NashUniversity of California-IrvineVerified email at uci.edu
Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
Cristiano GiuffridaAssociate Professor, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
Taddeus KroesVrije Universiteit AmsterdamVerified email at vu.nl
Per LarsenImmunant, Inc.Verified email at immunant.com
Paul KirthGoogleVerified email at uci.edu
Alexander PonticelloDoctoral Researcher, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Wolfgang KastnerAutomation Systems Group, TU WienVerified email at auto.tuwien.ac.at