Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Georg CarleTechnische Universität MünchenVerified email at net.in.tum.de
Yaron ShefferIntuitVerified email at intuit.com
Oliver GasserMax Planck Institute for InformaticsVerified email at mpi-inf.mpg.de
Lexi BrentICSIVerified email at icsi.berkeley.edu
Quirin ScheitleTechnical University of Munich (TUM)Verified email at net.in.tum.de
Paul RimbaData61, CSIROVerified email at data61.csiro.au
Vincent GramoliUniversity of Sydney and EPFLVerified email at sydney.edu.au
Andrea ContinellaAssistant Professor at University of TwenteVerified email at utwente.nl
Alexander PonomarevData61, CSIROVerified email at data61.csiro.au
Ingo WeberProfessor at TU Munich (Computer Science), Director at FraunhoferVerified email at tum.de
An Binh TranData61, CSIROVerified email at data61.csiro.au
Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
Oliver HohlfeldUniversity of KasselVerified email at ohohlfeld.com
Jens HillerRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Fabian P. HeldInterdisciplinary Senior Lecturer, The University of SydneyVerified email at sydney.edu.au
Lothar BraunAugsburg University of Applied SciencesVerified email at hs-augsburg.de
Bernhard ScholzThe University of SydneyVerified email at sydney.edu.au
François GauthierConsulting Researcher, Oracle LabsVerified email at oracle.com
Mark StaplesData61, CSIROVerified email at data61.csiro.au
Ernst BiersackVerified email at eurecom.fr