Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andrei SabelfeldChalmers University of TechnologyVerified email at chalmers.se
Daniel SchoepeAmazonVerified email at schoepe.org
Mads DamProfessor of Teleinformatics, KTH - Royal Institute of TechnologyVerified email at kth.se
Iulia BastysChalmers University of TechnologyVerified email at chalmers.se
Roberto GuancialeKTHVerified email at kth.se
Gurvan Le GuernicInria, FranceVerified email at inria.fr
Mikhail ShcherbakovPh.D. Student, KTH Royal Institute of TechnologyVerified email at kth.se
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Massimo MerroProfessor of Computer Science, Verona University - ItalyVerified email at univr.it
Isabella MastroeniComputer Science Dept. - University of VeronaVerified email at univr.it
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Amir M. AhmadianKTH Royal Institute of TechnologyVerified email at kth.se
Daniel HedinMälardalen UniversityVerified email at mdh.se
Raśl PardoIT University of CopenhagenVerified email at itu.dk
Gerardo SchneiderProfessor of Computer Science, University of GothenburgVerified email at cse.gu.se
Michael PradelProfessor of Computer Science, Head of Software Lab, University of StuttgartVerified email at iste.uni-stuttgart.de
Riccardo ScandariatoHead of the Institute of Software Security, Hamburg University of Technology (TUHH)Verified email at tuhh.de
Katja TumaAssistant Professor at the Vrije Universiteit AmsterdamVerified email at vu.nl
Guido SalvaneschiAssociate Professor - University of St.GallenVerified email at csail.mit.edu