Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andrei SabelfeldChalmers University of TechnologyVerified email at chalmers.se
Daniel SchoepeAmazonVerified email at schoepe.org
Mads DamProfessor of Teleinformatics, KTH - Royal Institute of TechnologyVerified email at kth.se
Iulia BastysChalmers University of TechnologyVerified email at chalmers.se
Gurvan Le GuernicInria, FranceVerified email at inria.fr
Roberto GuancialeKTHVerified email at kth.se
Massimo MerroProfessor of Computer Science, Verona University - ItalyVerified email at univr.it
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Isabella MastroeniComputer Science Dept. - University of VeronaVerified email at univr.it
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Raśl PardoIT University of CopenhagenVerified email at itu.dk
Gerardo SchneiderProfessor of Computer Science, University of GothenburgVerified email at cse.gu.se
Amir M. AhmadianKTH Royal Institute of TechnologyVerified email at kth.se
Riccardo ScandariatoHead of the Institute of Software Security, Hamburg University of Technology (TUHH)Verified email at tuhh.de
Katja TumaAssistant Professor at the Vrije Universiteit AmsterdamVerified email at vu.nl
Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michael PradelProfessor of Computer Science, Head of Software Lab, University of StuttgartVerified email at iste.uni-stuttgart.de
Daniel HedinMälardalen UniversityVerified email at mdh.se
Guido SalvaneschiAssociate Professor - University of St.GallenVerified email at csail.mit.edu
Marco GuarnieriIMDEA Software InstituteVerified email at imdea.org