Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
Marcus VölpCritiX Lab, Interdisciplinary Centre for Security, Reliability and Trust, University of LuxembourgVerified email at uni.lu
Jiangshan Yu (于江山)ARC DECRA Fellow and Senior Lecturer, Monash UniversityVerified email at monash.edu
Vivien QuémaProfessor, Grenoble INP (ENSIMAG)Verified email at imag.fr
David KozhayaABB Corporate ResearchVerified email at ch.abb.com
Vincent RahliUniversity of BirminghamVerified email at bham.ac.uk
Francisco M CoutoLASIGE, Departamento de Informática, Faculdade de Ciências, Universidade de Lisboa, PortugalVerified email at campus.ul.pt
Túlio PascoalCybersecurity & Privacy ConsultantVerified email at awk.lu
antoine boutetAssistant Professor, INSA-Lyon, CITI / Privatics InriaVerified email at insa-lyon.fr
Tong CaoKunyao AcademyVerified email at kunyaokeji.com
Sonia Ben MokhtarLIRIS CNRSVerified email at cnrs.fr
Baptiste LepersUniversity of SydneyVerified email at sydney.edu.au
Sebastien TixeuilProfessor of Computer Science, Sorbonne Université, LIP6 & IUFVerified email at lip6.fr
Silvia BonomiAssociate Professor, Universita' degli Studi di Roma 'La Sapienza'Verified email at diag.uniroma1.it
Johan PouwelseAssociate Professor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Lydia Y. ChenTU DelftVerified email at ieee.org
Stefanie RoosAssistant Professor, TU DelftVerified email at tudelft.nl
Bart CoxPhD student, TU DelftVerified email at tudelft.nl
Oğuzhan ErsoyPostdoc, Radboud UniversityVerified email at ru.nl
Maria FernandesPostdoctoral Scientist, University of OxfordVerified email at well.ox.ac.uk