Get my own profile
Public access
View all56 articles
24 articles
available
not available
Based on funding mandates
Co-authors
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Brijesh DongolUniversity of SurreyVerified email at surrey.ac.uk
Marie-Christine JakobsLMU MünchenVerified email at sosy.ifi.lmu.de
Cedric RichterUniversity of OldenburgVerified email at uol.de
Simon DohertyUniversity of SheffieldVerified email at sheffield.ac.uk
Arend RensinkProfessor in Computer Science, University of TwenteVerified email at utwente.nl
Felix PauckPaderborn UniversityVerified email at foellix.de
Oleg TravkinPhD Student, Universität PaderbornVerified email at zitmail.uni-paderborn.de
Jan HaltermannPhD Student, Computer Science Department, Carl von Ossietzky Universität OldenburgVerified email at uol.de
Arnab SharmaUniversity of PaderbornVerified email at uni-paderborn.de
Christian SoltenbornResearch and Teaching AssistantVerified email at uni-paderborn.de
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Ernst-Ruediger OlderogProfessor für Informatik, Universität OldenburgVerified email at informatik.uni-oldenburg.de
Wilhelm SchaeferProfessor für Informatik Universität PaderbornVerified email at upb.de
Michaela HuhnOstfalia, University of Applied Sciences, Computer Science FacultyVerified email at ostfalia.de
Gregor EngelsProfessor Computer Science, Paderborn University; Head SICP (Software Innovation Campus Paderborn)Verified email at upb.de
Dirk BeyerProfessor of Computer Science, LMU Munich, GermanyVerified email at lmu.de
Eyke HüllermeierProfessor of Computer Science, Paderborn UniversityVerified email at upb.de
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de