Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Moritz LippVerified email at mlq.me
- Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
- Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Daniel MoghimiSenior Research Scientist, GoogleVerified email at google.com
- Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
- Andreas KoglerGraz University of TechnologyVerified email at iaik.tugraz.at
- Dmitry EvtyushkinAssociate Professor, William & MaryVerified email at wm.edu
- Philipp OrtnerTechnische Universität BerlinVerified email at tu-berlin.de
- Benjamin von BergGraz University of TechnologyVerified email at tugraz.at
- Robert SchillingRivos Inc.Verified email at rivosinc.com
- Martin SchwarzlGraz University of TechnologyVerified email at iaik.tugraz.at
- David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
- Catherine EasdonDynatrace ResearchVerified email at dynatrace.com
- Khaled N. KhasawnehGeorge Mason UniversityVerified email at ucr.edu
- Martin HaubenwallnerGraz University of TechnologyVerified email at student.tugraz.at
- Mario WernerGraz University of TechnologyVerified email at iaik.tugraz.at
- Dimitrios SkarlatosComputer Science Department, Carnegie Mellon UniversityVerified email at cs.cmu.edu