Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Igor Kotenkohttp://comsec.spb.ru/kotenko/Verified email at comsec.spb.ru
Andrey ChechulinHead of the International Digital Forensics Center at St.Petersburg Federal Research Center of theVerified email at comsec.spb.ru
Maxim KolomeetsNewcastle UniversityVerified email at newcastle.ac.uk
Vasily DesnitskySPIIRASVerified email at comsec.spb.ru
Andrey FedorchenkoSt.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), Laboratory of Computer Security ProblemsVerified email at comsec.spb.ru
Elena DoynikovaSt. Petersburg Institute for Informatics and Automation of theVerified email at comsec.spb.ru
Olga TushkanovaСанкт-Петербургский институт информатики и автоматизации Российской академии наук, Санкт-Петербургский политехнический университет Петра ВеликогоVerified email at spbstu.ru
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
Roland RiekeFraunhofer SITVerified email at sit.fraunhofer.de
Christoph KraußDarmstadt University of Applied SciencesVerified email at h-da.de
Sergei SolovievProfessor, University of Toulouse 3Verified email at irit.fr
Konstantin IzrailovSaint Petersburg State University of TelecommunicationsVerified email at spbgut.ru
Diana Levshunм.н.с., Санкт-Петербургский институт информатики и автоматизации РАНVerified email at comsec.spb.ru