Get my own profile
Public access
View all39 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ufuk TopcuThe University of Texas at AustinVerified email at utexas.edu
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Hadas Kress-GazitCornell UniversityVerified email at cornell.edu
Bettina KönighoferAssistant Professor, Graz University of Technology, AustriaVerified email at iaik.tugraz.at
Robert KönighoferGraz University of TechnologyVerified email at iaik.tugraz.at
Hans-Jörg PeterSiemens EDAVerified email at siemens.com
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Stéphane LafortuneProfessor of Electrical Engineering and Computer Science, University of Michigan, USAVerified email at umich.edu
Vasumathi RamanVerified email at cds.caltech.edu
Scott NiekumAssociate Professor, University of Massachusetts AmherstVerified email at cs.umass.edu
Mohammed AlshiekhResearcher at University of Texas at AustinVerified email at utexas.edu
Stavros TripakisAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
Moshe Y. VardiRice UniversityVerified email at cs.rice.edu
Michael GerkeSchloss Dagstuhl - Leibniz-Zentrum für InformatikVerified email at dagstuhl.de
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Robert MattmüllerUniversity of Freiburg, GermanyVerified email at robert-mattmueller.de
Kai Weng Wong (Catherine Wong)Cornell UniversityVerified email at cornell.edu
Min WenGoogleVerified email at google.com
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Adam WalkerNICTA/UNSWVerified email at nicta.com.au