Get my own profile
Public access
View all2 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Freek VerbeekRadboud University, The NetherlandsVerified email at ou.nl
- Julien SchmaltzCGIVerified email at cgi.com
- Eyad AlkassarVerified email at wjpserver.cs.uni-saarland.de
- Burkhart WolffProfessor für Informatik, Universität Paris-SudVerified email at lri.fr
- Michael PaulitschIntelVerified email at intel.com
- Christoph BaumannSenior Researcher, Ericsson Security Research SwedenVerified email at ericsson.com
- Kevin MuellerAirbusVerified email at airbus.com
- Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
- Christoph KraußDarmstadt University of Applied SciencesVerified email at h-da.de
- Markus HeinrichSecurity Expert, INCYDE GmbHVerified email at 0x25.net
- Steven ObuaUniversity of EdinburghVerified email at inf.ed.ac.uk
- Dirk LeinenbachVerified email at dirkleinenbach.de
- Stephan TobiesSynopsysVerified email at tobies.info