Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Georg CarleTechnische Universität MünchenVerified email at net.in.tum.de
Oliver GasserIPinfoVerified email at ipinfo.io
Lexi BrentGoogleVerified email at google.com
Yaron ShefferIntuitVerified email at intuit.com
Quirin ScheitleTechnical University of Munich (TUM)Verified email at net.in.tum.de
Paul RimbaData61, CSIROVerified email at data61.csiro.au
Vincent GramoliUniversity of Sydney and EPFLVerified email at sydney.edu.au
Andrea ContinellaAssociate Professor at University of TwenteVerified email at utwente.nl
Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
Alexander PonomarevData61, CSIROVerified email at data61.csiro.au
Ingo WeberProfessor at TU Munich (Computer Science), Director at FraunhoferVerified email at tum.de
An Binh TranData61, CSIROVerified email at data61.csiro.au
Oliver HohlfeldUniversity of KasselVerified email at ohohlfeld.com
Jens HillerRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Quinn GrundyFaculty of Nursing, University of TorontoVerified email at utoronto.ca
Fabian P. HeldInterdisciplinary Senior Lecturer, The University of SydneyVerified email at sydney.edu.au
Bernhard ScholzThe University of SydneyVerified email at sydney.edu.au
François GauthierSenior Principal Researcher, Oracle LabsVerified email at oracle.com
Anna SperottoProfessor, University of TwenteVerified email at utwente.nl
Lothar BraunAugsburg University of Applied SciencesVerified email at hs-augsburg.de