Get my own profile
Public access
View all17 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Guenther RuheProfessor of Computer Science, Electrical and Software Engineering, University of CalgaryVerified email at ucalgary.ca
Dietmar PfahlUniversity of Tartu, EstoniaVerified email at ut.ee
Walid MaalejUniversity of HamburgVerified email at informatik.uni-hamburg.de
Henry ChoEngineering Science, University of TorontoVerified email at mail.utoronto.ca
Timo JohannDigital Transformation Manager at Es-geht-Energiesysteme GmbHVerified email at informatik.uni-hamburg.de
Bram AdamsQueen's UniversityVerified email at queensu.ca
Frank MaurerUniversity of CalgaryVerified email at ucalgary.ca
mahshid marboutiUniversity Of Calgary, Calgary, AlbertaVerified email at ucalgary.ca
Muhammad Rezaul Karim, PhDUniversity of CalgaryVerified email at ucalgary.ca
Christof EbertVectorVerified email at ieee.org
Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
Paul ChenSoftware Engineering, University of CalgaryVerified email at ucalgary.ca
Yuanfang CaiProfessor of Computer Science, Drexel UniversityVerified email at cs.drexel.edu
Rick KazmanUniversity of HawaiiVerified email at hawaii.edu
Alex DekhtyarProfessor, Department of Computer Science, Cal PolyVerified email at calpoly.edu
Jane Huffman HayesUniversity of KentuckyVerified email at cs.uky.edu
Thomas ZimmermannSr. Principal Researcher at Microsoft Research, RedmondVerified email at microsoft.com
Marios-Eleftherios FokaefsAssistant Professor, Polytechnique MontréalVerified email at polymtl.ca
Kelly LyonsFaculty of Information, University of TorontoVerified email at utoronto.ca
Giuliano (Giulio) AntoniolProfessor at DGIGL -- Polytechnique MontréalVerified email at ieee.org