Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Jan Tobias MuehlbergResearcher in Computer Science, Universite Libre Bruxelles & KU Leuven, BelgiumVerified email at ulb.be
- Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Andrew PaverdMicrosoftVerified email at microsoft.com
- Arseny KurnikovPhD student, Aalto UniversityVerified email at aalto.fi
- Gianluca ScopellitiKU Leuven, EricssonVerified email at ericsson.com
- Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
- David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
- Jan PennekampRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
- sepideh pouyanradPhd student, KU LeuvenVerified email at cs.kuleuven.be
- Christoph BaumannSenior Researcher, Ericsson Security Research SwedenVerified email at ericsson.com
- Lesly-Ann DanielKU LeuvenVerified email at kuleuven.be