Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mads DamProfessor of Teleinformatics, KTH - Royal Institute of TechnologyVerified email at kth.se
- Roberto GuancialeKTHVerified email at kth.se
- Hamed NematiKTH Royal Institute of TechnologyVerified email at kth.se
- Bernhard BeckertProfessor of Informatics, Karlsruhe Institute of TechnologyVerified email at kit.edu
- Jan Tobias MuehlbergResearcher in Computer Science, Universite Libre Bruxelles & KU Leuven, BelgiumVerified email at ulb.be
- Eddy TruyenResearch expert, K.U.LeuvenVerified email at cs.kuleuven.be
- Gerald BudigiriResearcherVerified email at kuleuven.be
- Sergey TverdyshevHUAWEIVerified email at huawei.com
- Christian GehrmannLund UniversityVerified email at eit.lth.se
- Gianluca ScopellitiKU Leuven, EricssonVerified email at ericsson.com
- Mats NäslundKTH, Royal Institute of TechnologyVerified email at kth.se
- Karl MeinkeProfessor of Computer Science KTH Royal Institute of TechnologyVerified email at kth.se
- Fredrik AsplundPh.D., KTH Royal Institute of TechnologyVerified email at kth.se
- DeJiu ChenAssociate Professor, KTH Royal Institute of TechnologyVerified email at kth.se
- Fritz AlderNVIDIAVerified email at nvidia.com
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- sepideh pouyanradPhd student, KU LeuvenVerified email at cs.kuleuven.be
- Narges KhakpourNewcastle UniversityVerified email at ncl.ac.uk
- Pablo BuirasKTH Royal Institute of TechnologyVerified email at kth.se
- Oliver SchwarzResearcher at RISE SICS
Follow
Christoph Baumann
Senior Researcher, Ericsson Security Research Sweden
Verified email at ericsson.com