Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Andreas PeterProfessor, Safety-Security-Interaction Group, University of Oldenburg, GermanyVerified email at uol.de
Benjamin ErbPostdoctoral Researcher, Ulm UniversityVerified email at uni-ulm.de
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Matthias MatousekPhD Student of Computer Science, University of Ulm, GermanyVerified email at uni-ulm.de
Stefan PfattheicherDepartment of Psychology and Behavioural Sciences, Aarhus UniversityVerified email at psy.au.dk
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Felix EngelmannIT University of CopenhagenVerified email at itu.dk
David MödingerPhD-Student, Ulm UniversityVerified email at uni-ulm.de
Franz J. HauckProfessor of Distributed Systems, Ulm University, GermanyVerified email at uni-ulm.de
Hoon Wei LimSingtelVerified email at singtel.com
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Bram Leendersstudent Distributed Systems and Services, KTH Royal Institute of TechnologyVerified email at kth.se
Jonathan PetitQualcommVerified email at qti.qualcomm.com
Michael P. HeinlSecurity Research Engineer, Fraunhofer AISECVerified email at aisec.fraunhofer.de
Rens W. van der HeijdenUlm University [2012-2019]Verified email at uni-ulm.de
Laurens Sionimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Kim WuytsDistriNet, KU LeuvenVerified email at cs.kuleuven.be