Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
- Sebastian SchinzelMünster University of Applied SciencesVerified email at fh-muenster.de
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Christian MainkaRuhr University BochumVerified email at rub.de
- Christopher MeyerReserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University BochumVerified email at rub.de
- Yuval ShavittTel Aviv UniversityVerified email at eng.tau.ac.il
- Nils GruschkaProfessor, University of Oslo, NorwayVerified email at ifi.uio.no
- Mario HeiderichPhD, Ruhr-University BochumVerified email at rub.de
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
- David AdrianIndependentVerified email at umich.edu
- Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
- Shaanan CohneyUniversity of MelbourneVerified email at unimelb.edu.au
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Erik TewsUniversity of TwenteVerified email at utwente.nl
- Marcus NiemietzNiederrhein University of Applied Sciences / Hackmanit GmbHVerified email at mniemietz.de
- Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
- Aaron Zaunerlambda: resilient.systemsVerified email at azet.org
- Christian WietfeldProfessor for Communication Networks, TU Dortmund UniversityVerified email at tu-dortmund.de
- Mohamad SbeitiTechnical University of DortmundVerified email at tu-dortmund.de
- Martin GrotheSenior Cyber Security Architect @ EYVerified email at rub.de