Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Anwar HithnawiUniversity of TorontoVerified email at cs.toronto.edu
Simon DuquennoyRISE SICSVerified email at ri.se
Lukas BurkhalterETH ZürichVerified email at inf.ethz.ch
René HummenRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Shahid RazaFull Professor & Cybersecurity Chair, University of Glasgow | Research Director Cybersecurity@RISEVerified email at glasgow.ac.uk
Klaus WehrleProfessor at RWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Wen Huunsw, csiro, nictaVerified email at unsw.edu.au
Thiemo VoigtUppsala University and RISE Computer Science (formerly SICS)Verified email at angstrom.uu.se
Kasun HewageUppsala UniversityVerified email at it.uu.se
Alexander ViandIntel LabsVerified email at intel.com
Sylvia RatnasamyProfessor of Computer Science, UC BerkeleyVerified email at berkeley.edu
Martin HenzeRWTH Aachen University and Fraunhofer FKIEVerified email at spice.rwth-aachen.de
Jens HillerRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Hanno WirtzRWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Jan Henrik Ziegeldorfaedifion GmbH, formerly RWTH AachenVerified email at comsys.rwth-aachen.de
Su LiHuaweiVerified email at huawei.com
James GrossKTH Royal Institute of Technology, StockholmVerified email at ee.kth.se
Prof. Sanjay JhaProfessor, School of Computer Science and Engineering, University of New South WalesVerified email at cse.unsw.edu.au
Jun Young KimKallipr. Formerly The University of New South Wales Australia, Data61 CSIRO, WBSVerified email at unsw.edu.au
Nicolas KüchlerETH ZürichVerified email at inf.ethz.ch