Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Andreas PeterProfessor, Safety-Security-Interaction Group, University of Oldenburg, GermanyVerified email at uol.de
Emmanuele ZambonEindhoven University of TechnologyVerified email at tue.nl
Emiliano CasalicchioSapienza University of Rome - Computer Science Dep.Verified email at uniroma1.it
Igor Nai FovinoJoint Research CentreVerified email at ec.europa.eu
Robin SommerResearcher, International Computer Science Institute, BerkeleyVerified email at icsi.berkeley.edu
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Rick HofstedeUniversity of TwenteVerified email at utwente.nl
Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
Thijs van EdePhD Candidate, University of TwenteVerified email at utwente.nl
Jonathan PetitQualcommVerified email at qti.qualcomm.com
Justyna ChromikPhD candidate, University of TwenteVerified email at utwente.nl
Anne RemkeUniversität MünsterVerified email at wwu.de
Erik TewsUniversity of TwenteVerified email at utwente.nl
Doina BucurUniversity of TwenteVerified email at utwente.nl
Dina HadziosmanovicDelft University of Technology