Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Emmanuele ZambonEindhoven University of TechnologyVerified email at tue.nl
Pernul GüntherProfessor für Wirtschaftsinformatik, Universität RegensburgVerified email at wiwi.uni-regensburg.de
Daniel SchletteResearcher, University of RegensburgVerified email at ur.de
Herson Esquivel-VargasInstituto Tecnológico de Costa RicaVerified email at itcr.ac.cr
Andrea ContinellaAssociate Professor at University of TwenteVerified email at utwente.nl
Emiliano CasalicchioSapienza University of Rome - Computer Science Dep.Verified email at uniroma1.it
Thijs van EdeAssistant Professor, University of TwenteVerified email at utwente.nl
Fabian BöhmInformation Security Consultant @ Q_PERIORVerified email at ur.de
Christin SeifertUniversity of Marburg / Hessian.AIVerified email at uni-marburg.de
Igor Nai FovinoJoint Research CentreVerified email at ec.europa.euAsbat El KhairiCybersecurity ResearcherVerified email at utwente.nl
Robin SommerCorelightVerified email at icsi.berkeley.edu
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nlPieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Rick HofstedeUniversity of TwenteVerified email at utwente.nl
Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
Thomas SchreckProfessorVerified email at hm.eduJonathan PetitQualcommVerified email at qti.qualcomm.com