Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jaco van de PolProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Tom van DijkUniversity of TwenteVerified email at utwente.nl
Stefan BlomUniversity of TwenteVerified email at utwente.nl
Gijs KantPhD Student in Computer Science, University of TwenteVerified email at cs.utwente.nl
Alfons LaarmanAssistant Professor, Leiden UniversityVerified email at liacs.leidenuniv.nl
Bernhard SteffenProfessor für Informatik, TU DortmundVerified email at cs.uni-dortmund.de
Falk HowarTU DortmundVerified email at tu-dortmund.de
Jens BendispostoVerified email at cs.uni-duesseldorf.de
Helen TreharneProfessor, Department of Computer Science, University of SurreyVerified email at surrey.ac.uk
Jorden WhitefieldSecurity Specialist Ethical Hacker, EricssonVerified email at ericsson.com