Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun PangUniversity of LuxembourgVerified email at uni.lu
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Benjamin Krumnowd-fineVerified email at th-koeln.de
Christof Ferreira TorresAssistant Professor in Computer Science, INESC-ID / Instituto Superior Técnico, University of LisbonVerified email at tecnico.ulisboa.pt
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
Robert NorvillUniversity of LuxembourgVerified email at uni.lu
Vincent van der MeerZuyd University of Applied SciencesVerified email at zuyd.nl
Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Verified email at saarlb.de
Erik P. de VinkAssociate Professor, Eindhoven University of TechnologyVerified email at win.tue.nl
Beltran Borja Fiz PontiverosUniversity of LuxembourgVerified email at uni.lu
Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
Merve SahinSAP Security ResearchVerified email at eurecom.fr