Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Thiemo VoigtUppsala University and RISE Computer Science (formerly SICS)Verified email at angstrom.uu.se
- Adam DunkelsVerified email at thingsquare.com
- Fredrik ÖsterlindSICSVerified email at sics.se
- Nicolas TsiftesRISE Research Institutes of SwedenVerified email at ri.se
- Sverker JansonRISE Research Institutes of SwedenVerified email at ri.se
- Luca MottolaProfessor, Politecnico di MilanoVerified email at polimi.it
- Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Gian Pietro PiccoProfessor, University of TrentoVerified email at unitn.it
- Kay RömerProfessor, TU GrazVerified email at tugraz.at
- JeongGil KoAssociate Professor, Yonsei UniversityVerified email at yonsei.ac.kr
- Pedro Jose MarronUniversity of Duisburg-EssenVerified email at uni-due.de
- Mathilde DurvyCiscoVerified email at cisco.com
- Stephen Dawson-HaggertyUniversity of California, BerkeleyVerified email at eecs.berkeley.edu
- David CULLERUniversity of California, BerkeleyVerified email at berkeley.edu
- Andreas TerzisGoogle DeepmindVerified email at google.com
- Simon DuquennoyRISE SICSVerified email at ri.se
- Shahid RazaChair Professor of Cybersecurity, University of Glasgow, UK | Research Director Cybersecurity, RISEVerified email at glasgow.ac.uk
- Zhitao HeASSA ABLOY ABVerified email at assaabloy.com
- JP VasseurCisco SystemsVerified email at cisco.com
- John CollinsLecturer in Computer Science (retired), University of MinnesotaVerified email at cs.umn.edu