Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mads DamProfessor of Teleinformatics, KTH - Royal Institute of TechnologyVerified email at kth.se
- Roberto GuancialeKTHVerified email at kth.se
- Hamed NematiKTH Royal Institute of TechnologyVerified email at kth.se
- Jan Tobias MuehlbergProf. for Embedded Systems Security, Universite Libre de Bruxelles, BelgiumVerified email at ulb.be
- Bernhard BeckertProfessor of Informatics, Karlsruhe Institute of TechnologyVerified email at kit.edu
- Eddy TruyenResearch expert, K.U.LeuvenVerified email at cs.kuleuven.be
- Gerald BudigiriResearcherVerified email at kuleuven.be
- Gianluca ScopellitiKU Leuven, EricssonVerified email at ericsson.com
- Thomas NymanL M EricssonVerified email at ericsson.com
- MERVE GÜLMEZKU LeuvenVerified email at kuleuven.be
- Sergey TverdyshevHUAWEIVerified email at huawei.com
- Christian GehrmannLund UniversityVerified email at eit.lth.se
- Fritz AlderNVIDIAVerified email at nvidia.com
- Mats NäslundKTH, Royal Institute of TechnologyVerified email at kth.se
- Karl MeinkeProfessor of Computer Science KTH Royal Institute of TechnologyVerified email at kth.se
- Fredrik AsplundPh.D., KTH Royal Institute of TechnologyVerified email at kth.se
- DeJiu ChenAssociate Professor, KTH Royal Institute of TechnologyVerified email at kth.se
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- sepideh pouyanradPhd student, KU LeuvenVerified email at cs.kuleuven.be
- Narges KhakpourNewcastle UniversityVerified email at ncl.ac.uk
Follow
Christoph Baumann
Senior Researcher, Ericsson Security Research Sweden
Verified email at ericsson.com