Get my own profile
Public access
View all52 articles
23 articles
available
not available
Based on funding mandates
Co-authors
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Brijesh DongolUniversity of SurreyVerified email at surrey.ac.uk
Marie-Christine JakobsLMU MünchenVerified email at sosy.ifi.lmu.de
Simon DohertyUniversity of SheffieldVerified email at sheffield.ac.uk
Cedric RichterUniversity of OldenburgVerified email at uol.de
Arend RensinkProfessor in Computer Science, University of TwenteVerified email at utwente.nl
Felix PauckPaderborn UniversityVerified email at foellix.de
Oleg TravkinPhD Student, Universität PaderbornVerified email at zitmail.uni-paderborn.de
Jan HaltermannPhD Student, Computer Science Department, Carl von Ossietzky Universität OldenburgVerified email at uol.de
Arnab SharmaUniversity of OldenburgVerified email at uni-oldenburg.de
Christian SoltenbornResearch and Teaching AssistantVerified email at uni-paderborn.de
Ernst-Ruediger OlderogProfessor für Informatik, Universität OldenburgVerified email at informatik.uni-oldenburg.de
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Wilhelm SchaeferProfessor für Informatik Universität PaderbornVerified email at upb.de
Gregor EngelsProfessor Computer Science, Paderborn University; Head SICP (Software Innovation Campus Paderborn)Verified email at upb.de
Michaela HuhnOstfalia, University of Applied Sciences, Computer Science FacultyVerified email at ostfalia.de
Dirk BeyerProfessor of Computer Science, LMU Munich, GermanyVerified email at lmu.de
Eyke HüllermeierProfessor of Computer Science, Paderborn UniversityVerified email at upb.de
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de