Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Igor Kotenkohttp://comsec.spb.ru/kotenko/Verified email at comsec.spb.ru
- Andrey ChechulinHead of the International Digital Forensics Center at St.Petersburg Federal Research Center of theVerified email at comsec.spb.ru
- Vasily DesnitskySPIIRASVerified email at comsec.spb.ru
- Maxim KolomeetsNewcastle UniversityVerified email at newcastle.ac.uk
- Andrey FedorchenkoSt.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), Laboratory of Computer Security ProblemsVerified email at comsec.spb.ru
- Elena DoynikovaSt. Petersburg Institute for Informatics and Automation of theVerified email at comsec.spb.ru
- Olga TushkanovaСанкт-Петербургский институт информатики и автоматизации Российской академии наук, Санкт-Петербургский политехнический университет Петра ВеликогоVerified email at spbstu.ru
- Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
- Roland RiekeFraunhofer SITVerified email at sit.fraunhofer.de
- Christoph KraußDarmstadt University of Applied SciencesVerified email at h-da.de
- Sergei SolovievProfessor, University of Toulouse 3Verified email at irit.fr
- Konstantin IzrailovSaint Petersburg State University of TelecommunicationsVerified email at spbgut.ru
- Diana Levshunм.н.с., Санкт-Петербургский институт информатики и автоматизации РАНVerified email at comsec.spb.ru