Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bertrand MeyerProfessor of Software Engineering, Constructor UniversityVerified email at inf.ethz.ch
Michael WahlerZurich University of Applied Sciences (ZHAW)Verified email at zhaw.ch
Alexander PretschnerProfessor of Computer Science, Technische Universität MünchenVerified email at in.tum.de
Matthew PatrickDepartment of Dermatology, University of MichiganVerified email at umich.edu
Wei YiChair of Software Engineering, ETH ZurichVerified email at inf.ethz.ch
Aurelien MonotABB Corporate ResearchVerified email at ch.abb.com
John A. ClarkProfessor of Computer and Information Security, University of SheffieldVerified email at sheffield.ac.uk
Mariam KiranLawrence Berkeley National LaboratoryVerified email at es.net
Iulian NeamtiuProfessor of Computer Science, New Jersey Institute of TechnologyVerified email at njit.edu
Jan VitekNortheastern UniversityVerified email at neu.edu
Carlo A. FuriaSoftware Institute - USI Università della Svizzera italianaVerified email at usi.ch
Atul KumarIBM ResearchVerified email at in.ibm.com
Gunter SaakeProfessor of Computer Science, Magdeburg UniversityVerified email at ovgu.de
Shigeru ChibaThe University of TokyoVerified email at acm.org
Walter CazzolaUniversità degli Studi di MilanoVerified email at di.unimi.it
Rob AlexanderSenior Lecturer / Associate ProfessorVerified email at york.ac.uk
Martin NordioETH ZurichVerified email at inf.ethz.ch
Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
Patrick EugsterProf. Università della Svizzera italiana (USI), Adjunct Prof. Purdue UniversityVerified email at usi.ch
Mian Asbat AhmadSoftware Engineer, Capgemini LondonVerified email at imperial.ac.uk