Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Giulio JacucciUniversity of HelsinkiVerified email at helsinki.fi
Dorota GlowackaUniversity of HelsinkiVerified email at cs.helsinki.fi
Antti OulasvirtaAalto UniversityVerified email at aalto.fi
Ksenia KonyushkovaResearch Scientist, DeepMindVerified email at google.com
Jilles VreekenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Manuel J. A. Eugstermjae.netVerified email at mjae.net
Dinesh WijekoonVerified email at helsinki.fi
Jiehan ZhouUniversity of OuluVerified email at oulu.fi
Alan MedlarUniversity of HelsinkiVerified email at helsinki.fi
Eve HogganAssociate Professor, Aarhus UniversityVerified email at cs.au.dk
Jukka RiekkiProfessor, University of OuluVerified email at oulu.fi
Eemil LagerspetzPostdoctoral Researcher at Department of Computer Science, University of HelsinkiVerified email at cs.helsinki.fi
Sasu TarkomaProfessor of Computer Science, University of HelsinkiVerified email at helsinki.fi
Antti JylhäSenior Lecturer, The Hague University of Applied SciencesVerified email at hhs.nl
Antti SalovaaraSenior university lecturer, Aalto UniversityVerified email at aalto.fi
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Janne LindqvistAalto University (Computer Science)Verified email at aalto.fi