Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas G. KoslowskiUniversity of FreiburgVerified email at iig.uni-freiburg.de
Wil van der AalstProfessor of Process and Data Science, RWTH Aachen University || Celonis || Fraunhofer FIT || TU/eVerified email at pads.rwth-aachen.de
Christian ZimmermannRobert Bosch Corporate ResearchVerified email at de.bosch.com
Maarten de RijkeUniversity of Amsterdam & ICAIVerified email at uva.nl
Carlos ArecesUniversidad Nacional de Córdoba - CONICETVerified email at famaf.unc.edu.ar
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Paolo CeravoloUniversità degli Studi di MilanoVerified email at unimi.it
Ernesto DamianiKhalifa UniversityVerified email at ku.ac.ae
Niels LohmannUniversität RostockVerified email at uni-rostock.de
Meike UllrichKIT, Institute AIFBVerified email at kit.edu
Philippe Cudre-MaurouxFull Professor (Computer Science), U. of Fribourg–SwitzerlandVerified email at unifr.ch
Raimundas MatulevičiusProfessor, University of TartuVerified email at ut.ee
Prof. Keyun RuanAlphabet Inc; www.ruankeyun.comVerified email at ruankeyun.com
Michael HuthProfessor of Computer Science, Computing, Imperial College LondonVerified email at imperial.ac.uk
Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Stefanie Rinderle-MaFull Professor, Technical University of Munich, Department of InformaticsVerified email at tum.de
Silvio RaniseFBKVerified email at fbk.eu