Get my own profile
Public access
View all19 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Thiemo VoigtUppsala University and RISE Computer Science (formerly SICS)Verified email at it.uu.se
Utz RoedigProfessor, University College CorkVerified email at cs.ucc.ie
Simon DuquennoyRISE SICSVerified email at ri.se
Hossein ShafaghNetflix, formerly ETH ZurichVerified email at inf.ethz.ch
René HummenRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Kasun HewageUppsala UniversityVerified email at it.uu.se
Prasant MisraSenior Scientist, TCS ResearchVerified email at tcs.com
Marco TilocaRISE Research Institutes of SwedenVerified email at ri.se
Zhitao HeASSA ABLOY ABVerified email at assaabloy.com
Klaus WehrleProfessor at RWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Göran SelanderEricssonVerified email at ericsson.com
Mudassar Aslam (PhD)National University of Computer and Emerging Sciences (FAST-NUCES)Verified email at nu.edu.pk
Joakim ErikssonRISE Research Institutes of SwedenVerified email at ri.se
Ibrahim Ethem BagciNetwork Threat Analyst & Detection Engineer at VMware, Inc.Verified email at vmware.com
Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
Jan Henrik Ziegeldorfaedifion GmbH, formerly RWTH AachenVerified email at comsys.rwth-aachen.de
Qusay F. HassanUnited States Agency for International DevelopmentVerified email at usaid.gov
Han WangRISE Research Institute in SwedenVerified email at ri.se
Ludwig SeitzCombitech ABVerified email at combitech.se
Nicolas TsiftesRISE Research Institutes of SwedenVerified email at ri.se