Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
Martin Schmiedecker (Mulazzani)Bosch Engineering GmbHVerified email at schmiedecker.net
Sebastian SchrittwieserUniversity of ViennaVerified email at univie.ac.at
Manuel LeithnerInformation Security Researcher, SBA ResearchVerified email at sba-research.org
Peter KiesebergSt. Pölten University of Applied Sciences, AustriaVerified email at fhstp.ac.at
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Georg MerzdovnikSBA ResearchVerified email at sba-research.org
Sebastian NeunerSecurity EngineerVerified email at neuner.io
Damjan BuhovResearcherVerified email at fhstp.ac.at
Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
Simon TjoaSt. Poelten University of Applied SciencesVerified email at fhstp.ac.at
Philipp WinterAmnesic SystemsVerified email at nymity.ch
Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
Svenja SchröderResearch Fellow at University of ViennaVerified email at univie.ac.at
Martina LindorferAssociate Professor at TU WienVerified email at tuwien.ac.at
Victor van der VeenQualcomm Product SecurityVerified email at qualcomm.com
Aaron Zaunerlambda: resilient.systemsVerified email at azet.org
Wilfried MayerVerified email at tuwien.ac.at