Get my own profile
Public access
View all18 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Alexander PretschnerProfessor of Computer Science, Technische Universität MünchenVerified email at in.tum.de
Juan David Guarnizo HernandezPostDoc at ZHAWVerified email at zhaw.ch
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Jesús SolanoETH ZürichVerified email at inf.ethz.ch
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Flavio ToffaliniRUB, Assistant ProfessorVerified email at rub.de
John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchVerified email at hitachienergy.com
Ivan HomoliakAssociate Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
Esteban RiveraInstitute for Automotive Engineering, TUMVerified email at tum.de
Lizzy TenganaEricsson ABVerified email at ericsson.com
Jan JürjensUniversität Koblenz-Landau, GermanyVerified email at jurjens.de
Alejandra CastelblancoPhD Candidate, TUM and Helmholtz Center MunichVerified email at helmholtz-muenchen.de
Chuadhry Mujeeb AhmedNewcastle UniversityVerified email at newcastle.ac.uk
Sebastian BanescuAsymmetric ResearchVerified email at asymmetric.re
Andrei SabelfeldChalmers University of TechnologyVerified email at chalmers.se
Boris KöpfAzure Research, MicrosoftVerified email at microsoft.com
Sudipta ChattopadhyayAssociate Professor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Jorge CuellarUni Passau, Univ de los Andes (Bogota)Verified email at gw.uni-passau.de
Xiaolu HouFaculty of Informatics and Information Technologies, Slovak University of Technology, SlovakiaVerified email at stuba.sk