Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun PangUniversity of LuxembourgVerified email at uni.lu
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Christof Ferreira TorresPostdoctoral Researcher, University of LuxembourgVerified email at uni.lu
Benjamin KrumnowPhD-Candidate, TH Köln, Open UniversiteitVerified email at th-koeln.de
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Verified email at saarlb.de
Erik P. de VinkAssociate Professor, Eindhoven University of TechnologyVerified email at win.tue.nl
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
Jeroen van den BosNetherlands Forensic InstituteVerified email at infuse.org
Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
Harm van BeekSenior Digital Forensic Scientist, Netherlands Forensic InstituteVerified email at nfi.nl
Sasa RadomirovicUniversity of SurreyVerified email at surrey.ac.uk
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it