Get my own profile
Public access
View all2 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Andrey ChechulinHead of the International Digital Forensics Center at St.Petersburg Federal Research Center of theVerified email at comsec.spb.ru
- Elena DoynikovaSt. Petersburg Institute for Informatics and Automation of theVerified email at comsec.spb.ru
- Vasily DesnitskySPIIRASVerified email at comsec.spb.ru
- Andrey FedorchenkoSt.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), Laboratory of Computer Security ProblemsVerified email at comsec.spb.ru
- Maxim KolomeetsNewcastle UniversityVerified email at newcastle.ac.uk
- Alexander UlanovHP LabsVerified email at hp.com
- Victor SkorminDistinguished Service Professor of Electrical Engineering Binghamton UniversityVerified email at binghamton.edu
- Gustavo Gonzalez GranadilloAtos SpainVerified email at atos.net
- Jose Fran. RuizAtosVerified email at atos.net
- Antonio MañaProfessor of Computer Science, University of MalagaVerified email at lcc.uma.es
- Pavel LaskovUniversity of LiechtensteinVerified email at uni.li
- Klaus-Robert MüllerGoogle DeepMind & TU Berlin & Korea University & Max Planck Institute for Informatics, GermanyVerified email at tu-berlin.de
- Christin Schäferacs plus GmbHVerified email at acs-plus.de
- Hervé DebarProfesseur, Télécom SudParis, Institut Mines-Télécom, Institut Polytechnique de ParisVerified email at telecom-sudparis.eu
- James Bret MichaelProfessor of Computer Science, Naval Postgraduate SchoolVerified email at nps.edu
- Krzysztof SzczypiorskiWarsaw University of Technology, PolandVerified email at pw.edu.pl
- Rafal LeszczynaProfesor, Politechnika GdańskaVerified email at zie.pg.gda.pl