Crea il mio profilo
Accesso pubblico
Visualizza tutto31 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Matthias HollickProfessor of Computer Science, Technische Universität DarmstadtEmail verificata su seemoo.tu-darmstadt.de
salil kanhereProfessor, UNSW Sydney, AustraliaEmail verificata su unsw.edu.au
Daniel BurgstahlerTU DarmstadtEmail verificata su kom.tu-darmstadt.de
Johannes SchmittABBEmail verificata su de.abb.com
Lucas PereiraITI, LARSyS, Instituto Superior Técnico, Universidade de LisboaEmail verificata su tecnico.ulisboa.pt
Bernd-Christian RennerFull Professor, Hamburg University of Technology (TUHH)Email verificata su tuhh.de
Mazen BouchurTU ClausthalEmail verificata su tu-clausthal.de
Christoph KlemenjakResearch Assistant @ University of KlagenfurtEmail verificata su ieee.org
Paul BaumannSiemens Schweiz AGEmail verificata su siemens.com
Marc WernerCorporate Security and Privacy Competence Center, Continental AGEmail verificata su continental.com
Manzil ZaheerGoogle ResearchEmail verificata su cmu.edu
Delphine ReinhardtFull professor, Computer Security and Privacy, Georg-August-Universität Göttingen, GermanyEmail verificata su cs.uni-goettingen.de
Benjamin VölkerUniversity of FreiburgEmail verificata su informatik.uni-freiburg.de
Stefan SchulteHamburg University of TechnologyEmail verificata su tuhh.de
Volker TurauProfessor of Computer Science, Hamburg University of TechnologyEmail verificata su tuhh.de
Martin RingwelskiEhemals Wissenschaftlicher Mitarbeiter, Technische Universität Hamburg-HarburgEmail verificata su martimedia.de
Jörg P. MüllerFull Professor, Department of Informatics, TU ClausthalEmail verificata su tu-clausthal.de
Anthony FaustineLead data scientist, EatonEmail verificata su eaton.com
Jin ZhangShenzhen UniversityEmail verificata su szu.edu.cn
Mario BergésProfessor, Civil and Environmental Engineering Department, Carnegie Mellon UniversityEmail verificata su cmu.edu