Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Daniel GenkinGeorgia TechVerified email at gatech.edu
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Yuval YaromThe University of Adelaide
Clémentine MauriceUniv Lille, CNRS, InriaVerified email at inria.fr
Claudio CanellaVerified email at iaik.tugraz.at
Daniel MoghimiGoogleVerified email at google.com
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Raphael SpreitzerSGSVerified email at sgs.com
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Marina MinkinUniversity of MichiganVerified email at umich.edu
Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
Martin SchwarzlGraz University of TechnologyVerified email at iaik.tugraz.at
Andreas KoglerGraz University of TechnologyVerified email at iaik.tugraz.at
Jonas JuffingerGraz University of Technology, Lamarr Security ResearchVerified email at lamarr.at
Dmitry EvtyushkinAssistant Professor, William & MaryVerified email at wm.edu
Robert SchillingGraz University of TechnologyVerified email at iaik.tugraz.at