Get my own profile
Co-authors
Falko DresslerTelecommunication Networks (TKN), TU Berlin, GermanyVerified email at ccs-labs.org
Christoph SommerChair of Networked Systems Modeling, TU Dresden, GermanyVerified email at tu-dresden.de
David EckhoffTUM CREATEVerified email at tum-create.edu.sg
Helge JanickeCyber Security Cooperative Research CentreVerified email at cybersecuritycrc.org.au
Ying HeThe University of NottinghamVerified email at nottingham.ac.uk
Yuchen ZhaoImperial College LondonVerified email at imperial.ac.uk
Leandros MaglarasAssociate Professor / Reader in Cybersecurity, De Montfort UniversityVerified email at dmu.ac.uk
Ali H. Al-BayattiAssociate Professor, Cyber Technology Institute, De Montfort UniversityVerified email at dmu.ac.uk
Eerke BoitenSchool of Computer Science and Informatics, De Montfort University, UKVerified email at dmu.ac.uk
Thomas Halva LabellaLuxoftVerified email at online.de
Ulrich RüdeProfessor for Computational Science and Engineering, FAU Erlangen-NürnbergVerified email at fau.de
Kai-Steffen HielscherAssitant Professor Computer Science, FAU ErlangenVerified email at fau.de
Aladdin AyeshProfessor of Artificial Intelligence, De Montfort University, UKVerified email at dmu.ac.uk
Isabel Wagner (Dietrich)
Verified email at dmu.ac.uk - Homepage