Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thomas G. KoslowskiUniversity of FreiburgVerified email at iig.uni-freiburg.de
- Wil van der AalstProfessor of Process and Data Science, RWTH Aachen University || Celonis || Fraunhofer FIT || TU/eVerified email at pads.rwth-aachen.de
- Christian ZimmermannRobert Bosch Corporate ResearchVerified email at de.bosch.com
- Maarten de RijkeUniversity of Amsterdam & ICAIVerified email at uva.nl
- Carlos ArecesUniversidad Nacional de Córdoba - CONICETVerified email at famaf.unc.edu.ar
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Ernesto DamianiKhalifa UniversityVerified email at ku.ac.ae
- Niels LohmannUniversität RostockVerified email at uni-rostock.de
- Meike UllrichKIT, Institute AIFBVerified email at kit.edu
- Paolo CeravoloUniversità degli Studi di MilanoVerified email at unimi.it
- Prof. Keyun RuanAlphabet Inc; www.ruankeyun.comVerified email at ruankeyun.com
- Raimundas MatulevičiusProfessor, University of TartuVerified email at ut.ee
- Philippe Cudre-MaurouxFull Professor (Computer Science), U. of Fribourg–SwitzerlandVerified email at unifr.ch
- Michael HuthProfessor of Computer Science, Computing, Imperial College LondonVerified email at imperial.ac.uk
- Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- Stefanie Rinderle-MaFull Professor, Technical University of Munich, Department of InformaticsVerified email at tum.de
- Silvio RaniseFBKVerified email at fbk.eu