Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Georg CarleTechnische Universität MünchenVerified email at net.in.tum.de
Oliver GasserIPinfoVerified email at ipinfo.io
Lexi BrentGoogleVerified email at google.comYaron ShefferIntuitVerified email at intuit.com
Quirin ScheitleTechnical University of Munich (TUM)Verified email at net.in.tum.deAnna SperottoProfessor, University of TwenteVerified email at utwente.nl
Paul RimbaData61, CSIROVerified email at data61.csiro.au
Vincent GramoliUniversity of Sydney and EPFLVerified email at sydney.edu.au
Andrea ContinellaAssociate Professor at University of TwenteVerified email at utwente.nl
Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Alexander PonomarevData61, CSIROVerified email at data61.csiro.au
Ingo WeberProfessor at TU Munich (Computer Science), Director at FraunhoferVerified email at tum.de
An Binh TranData61, CSIROVerified email at data61.csiro.auOliver HohlfeldUniversity of KasselVerified email at uni-kassel.de
Jens HillerRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Mattijs JonkerUniversity of TwenteVerified email at utwente.nlQuinn GrundyFaculty of Nursing, University of TorontoVerified email at utoronto.ca
Fabian P. HeldInterdisciplinary Senior Lecturer, The University of SydneyVerified email at sydney.edu.au
Bernhard ScholzThe University of SydneyVerified email at sydney.edu.au