Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Andrei SabelfeldChalmers University of TechnologyVerified email at chalmers.se
- Daniel SchoepeAmazonVerified email at schoepe.org
- Mads DamProfessor of Teleinformatics, KTH - Royal Institute of TechnologyVerified email at kth.se
- Roberto GuancialeKTHVerified email at kth.se
- Iulia BastysChalmers University of TechnologyVerified email at chalmers.se
- Mikhail ShcherbakovPh.D. Student, KTH Royal Institute of TechnologyVerified email at kth.se
- Gurvan Le GuernicInria, FranceVerified email at inria.fr
- Amir M. AhmadianVerified email at kth.se
- Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Benoit BaudryProfessor of Software Engineering, Université de MontréalVerified email at umontreal.ca
- Massimo MerroProfessor of Computer Science, Verona University - ItalyVerified email at univr.it
- Michele PasquaUniversity of VeronaVerified email at univr.it
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Daniel HedinMälardalen UniversityVerified email at mdh.se
- Mohammad M. AhmadpanahPh.D. student, Computer Science - Information Security, Chalmers University of TechnologyVerified email at chalmers.se
- Eric OlssonPh.D. student, Computer Science - Information Security, Chalmers University of TechnologyVerified email at chalmers.se
- Guido SalvaneschiAssociate Professor - University of St.GallenVerified email at csail.mit.edu
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Isabella MastroeniComputer Science Dept. - University of VeronaVerified email at univr.it
- Riccardo ScandariatoHead of the Institute of Software Security, Hamburg University of Technology (TUHH)Verified email at tuhh.de