Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
Sebastian SchinzelMünster University of Applied SciencesVerified email at fh-muenster.de
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Christian MainkaRuhr University BochumVerified email at rub.de
Christopher MeyerReserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University BochumVerified email at rub.de
Yuval ShavittTel Aviv UniversityVerified email at eng.tau.ac.il
Nils GruschkaUniversity of Oslo, NorwayVerified email at ifi.uio.no
Mario HeiderichPhD, Ruhr-University BochumVerified email at rub.de
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
David AdrianUniversity of MichiganVerified email at umich.edu
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Shaanan CohneyUniversity of MelbourneVerified email at unimelb.edu.au
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Erik TewsUniversity of TwenteVerified email at utwente.nl
Marcus NiemietzNiederrhein University of Applied Sciences / Hackmanit GmbHVerified email at mniemietz.de
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Aaron Zaunerlambda: resilient.systemsVerified email at azet.org
Christian WietfeldProfessor for Communication Networks, TU Dortmund UniversityVerified email at tu-dortmund.de
Mohamad SbeitiTechnical University of DortmundVerified email at tu-dortmund.de
Martin GrotheSenior Cyber Security Architect @ EYVerified email at rub.de