Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun PangUniversity of LuxembourgVerified email at uni.lu
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Benjamin KrumnowPhD-Candidate, TH Köln, Open UniversiteitVerified email at th-koeln.de
Christof Ferreira TorresPostdoctoral Researcher, ETH ZurichVerified email at inf.ethz.ch
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
Robert NorvillUniversity of LuxembourgVerified email at uni.lu
Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Verified email at saarlb.de
Erik P. de VinkAssociate Professor, Eindhoven University of TechnologyVerified email at win.tue.nl
Vincent van der MeerZuyd University of Applied ScienceVerified email at zuyd.nl
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
Beltran Borja Fiz PontiverosUniversity of LuxembourgVerified email at uni.lu
Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
Harm van BeekSenior Digital Forensic Scientist, Netherlands Forensic InstituteVerified email at nfi.nl