Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun PangUniversity of LuxembourgVerified email at uni.lu
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Christof Ferreira TorresPostdoctoral Researcher, ETH ZurichVerified email at inf.ethz.ch
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Benjamin Krumnowd-fineVerified email at th-koeln.de
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
Robert NorvillUniversity of LuxembourgVerified email at uni.lu
Vincent van der MeerZuyd University of Applied SciencesVerified email at zuyd.nl
Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Verified email at saarlb.de
Erik P. de VinkAssociate Professor, Eindhoven University of TechnologyVerified email at win.tue.nl
Beltran Borja Fiz PontiverosUniversity of LuxembourgVerified email at uni.lu
Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
Harm van BeekSenior Digital Forensic Scientist, Netherlands Forensic InstituteVerified email at nfi.nl