Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Arthur GervaisAssociate Professor (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Julian SchütteGoogleVerified email at google.com
Beltran Borja Fiz PontiverosUniversity of LuxembourgVerified email at uni.lu
Mathis SteichenPhD Student, University of Luxembourg (SnT)Verified email at uni.lu
Ramiro CaminoLuxembourg Institute of Science and TechnologyVerified email at list.lu
Antonio Ken IannilloInterdisciplinary Centre for Security, Reliability and Trust (SnT) - University of Luxembourg (UL)Verified email at uni.lu
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Wolfgang GrätherFraunhofer FITVerified email at fit.fraunhofer.de
Robert NorvillUniversity of LuxembourgVerified email at uni.lu
Ben WeintraubPhD Candidate, Northeastern UniversityVerified email at northeastern.edu
Rolando Trujillo RasúaRamon i Cajal ResearcherVerified email at urv.cat
Pascal BouvryProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Grégoire DanoyUniversity of LuxembourgVerified email at uni.lu
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Follow