Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jun PangUniversity of LuxembourgVerified email at uni.lu
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
- Christof Ferreira TorresAssistant Professor in Computer Science, INESC-ID / Instituto Superior Técnico, University of LisbonVerified email at tecnico.ulisboa.pt
- Benjamin Krumnowd-fineVerified email at th-koeln.de
- Naipeng DongThe University of QueenslandVerified email at uq.edu.au
- Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
- Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
- Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
- Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
- Robert NorvillUniversity of LuxembourgVerified email at uni.lu
- Vincent van der MeerZuyd University of Applied SciencesVerified email at zuyd.nl
- Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Verified email at saarlb.de
- Erik P. de VinkAssociate Professor, Eindhoven University of TechnologyVerified email at win.tue.nl
- Beltran Borja Fiz PontiverosUniversity of LuxembourgVerified email at uni.lu
- Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
- James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
- Merve SahinSAP Security ResearchVerified email at eurecom.fr