Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Anupam DasNorth Carolina State UniversityVerified email at ncsu.edu
Christopher LentzschIAW, Ruhr-University BochumVerified email at ruhr-uni-bochum.de
Tobias UrbanInstitute for Internet Security - if(is)Verified email at internet-sicherheit.de
Thomas HerrmannRuhr-Universität BochumVerified email at rub.de
Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
Norbert PohlmannProfessor and DirectorVerified email at norbert-pohlmann.com
Henry HosseiniUniversity of MünsterVerified email at wi.uni-muenster.de
Pardis Emami-NaeiniAssistant Professor, Computer Science Department, Duke UniversityVerified email at cs.duke.edu
Sruti BhagavatulaNorthwestern UniversityVerified email at northwestern.edu
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Dennis TatangRuhr-University BochumVerified email at rub.de
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Hana HabibCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundVerified email at tu-dortmund.de
Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
Franziska HerbertPhD Student @ Ruhr University BochumVerified email at ruhr-uni-bochum.de