Get my own profile
Public access
View all12 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
- R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
- Amina BassitMichigan State UniversityVerified email at msu.edu
- Benny FuhryIntelVerified email at intel.com
- Ferdinand BrasserSANCTUARY Systems GmbHVerified email at sanctuary.dev
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Raad BahmaniTU DarmstadtVerified email at tu-darmstadt.de
- Marc DAMIEUniversité de Lille, Inria, CNRS, Centrale LilleVerified email at inria.fr
- Jonas BöhlerSAP Security ResearchVerified email at sap.com
- Daniel BernauSAP Security ResearchVerified email at sap.com
- Prof. Dr. Andreas SchaadUniversity of Applied Sciences OffenburgVerified email at hs-offenburg.de
- Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
- Federico MazzonePhD student, University of TwenteVerified email at utwente.nl
- Jan RamonSenior researcher, INRIA, FranceVerified email at inria.fr