Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Anupam DasNorth Carolina State UniversityVerified email at ncsu.edu
Thomas HerrmannRuhr-Universität BochumVerified email at rub.de
Tobias UrbanInstitute for Internet Security - if(is)Verified email at internet-sicherheit.de
Christopher LentzschIAW, Ruhr-University BochumVerified email at ruhr-uni-bochum.de
Norbert PohlmannProfessor and DirectorVerified email at norbert-pohlmann.com
Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
Pardis Emami-NaeiniPostdoctoral Scholar, University of WashingtonVerified email at cs.washington.edu
Sruti BhagavatulaNorthwestern UniversityVerified email at northwestern.edu
Dennis TatangRuhr-University BochumVerified email at rub.de
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Henry HosseiniUniversity of MünsterVerified email at wi.uni-muenster.de
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Kai-Uwe LoserRuhr-Universität BochumVerified email at rub.de
Hana HabibCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Daniel SmullenApplied Scientist, AmazonVerified email at amazon.com
Mahadev SatyanarayananCarnegie Group University Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de