Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Anupam DasNorth Carolina State UniversityVerified email at ncsu.edu
Christopher LentzschIAW, Ruhr-University BochumVerified email at ruhr-uni-bochum.de
Thomas HerrmannRuhr-Universität BochumVerified email at rub.de
Tobias UrbanInstitute for Internet Security - if(is)Verified email at internet-sicherheit.de
Norbert PohlmannProfessor and DirectorVerified email at norbert-pohlmann.com
Henry HosseiniUniversity of MünsterVerified email at wi.uni-muenster.de
Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
Pardis Emami-NaeiniAssistant Professor, Computer Science Department, Duke UniversityVerified email at cs.duke.edu
Dennis TatangRuhr-University BochumVerified email at rub.de
Sruti BhagavatulaNorthwestern UniversityVerified email at northwestern.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Kai-Uwe LoserRuhr-Universität BochumVerified email at rub.de
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundVerified email at tu-dortmund.de
Florian Marius FarkePhD Student @ Ruhr University BochumVerified email at rub.de
Hana HabibCarnegie Mellon UniversityVerified email at andrew.cmu.edu