Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
- Marcus VölpCritiX Lab, Interdisciplinary Centre for Security, Reliability and Trust, University of LuxembourgVerified email at uni.lu
- Jiangshan Yu (于江山)Associate Professor, University of SydneyVerified email at sydney.edu.au
- David KozhayaABB Corporate ResearchVerified email at ch.abb.com
- Vincent RahliUniversity of BirminghamVerified email at bham.ac.uk
- Vivien QuémaProfessor, Grenoble INP - Ensimag, UGAVerified email at imag.fr
- Francisco M CoutoLASIGE, Departamento de Informática, Faculdade de Ciências, Universidade de Lisboa, PortugalVerified email at campus.ul.pt
- Tong CaoThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Túlio PascoalPwC LuxembourgVerified email at pwc.lu
- antoine boutetAssistant Professor, INSA-Lyon, CITI / Privatics InriaVerified email at insa-lyon.fr
- Sonia Ben MokhtarLIRIS CNRSVerified email at cnrs.fr
- Baptiste LepersUniversité de NeuchâtelVerified email at unine.ch
- Johan PouwelseAssociate Professor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
- Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
- Sebastien TixeuilProfessor of Computer Science, Sorbonne Université, LIP6 & IUFVerified email at lip6.fr
- Silvia BonomiAssociate Professor, Universita' degli Studi di Roma 'La Sapienza'Verified email at diag.uniroma1.it
- Bart CoxPhD student, TU DelftVerified email at tudelft.nl
- Stefanie RoosProfessor, University of Kaiserslautern-LandauVerified email at cs.rptu.de
- Oğuzhan ErsoyResearch Lead, GensynVerified email at gensyn.ai