Get my own profile
Public access
View all13 articles
5 articles
available
not available
Based on funding mandates
Co-authors
vassilis prevelakisGuest Professor of Computer Security, TU BraunschweigVerified email at ida.ing.tu-bs.de
Sebastian SteinhorstAssociate Professor, Dept. of Electrical and Computer Engineering, Technical University of MunichVerified email at tum.de
Rolf ErnstProfessor at Institute of Computer and Network Engineering, TU Braunschweig, GermanyVerified email at tu-bs.de
Jan LauingerTechnical University of MunichVerified email at tum.de
Marcus NolteTU Braunschweig, Institut f. Regelungstechnik, AG EFSVerified email at ifr.ing.tu-bs.de
Marinos TsantekidisPhD researcher, Technical University BraunschweigVerified email at ida.ing.tu-bs.de
Zain A. H. HammadehInstitute for Software Technology, German Aerospace Center (DLR)Verified email at dlr.de
Emanuel RegnathTechnical University of MunichVerified email at tum.de
Muhammad Ali SiddiqiTU DelftVerified email at tudelft.nl
Christos StrydisAssociate professor, Neuroscience Department, Erasmus Medical CenterVerified email at erasmusmc.nl
Robert SeepersPhD Student Erasmus MCVerified email at erasmusmc.nl
Johannes SchlatowGenode LabsVerified email at genode-labs.com
Jens ErnstbergerTechnical University of MunichVerified email at tum.de
Mudassar Aslam (PhD)National University of Computer and Emerging Sciences (FAST-NUCES)Verified email at nu.edu.pk
Shahid RazaDirector of Cybersecurity @ RISE Sweden (formerly SICS) | Associate Professor, Uppsala UniversityVerified email at ri.se
jihane najarDoctoranteVerified email at ida.ing.tu-bs.de
Lea SchönbergerResearch Associate (PhD Student), Faculty of Computer Science, TU Dortmund UniversityVerified email at tu-dortmund.de
Follow
Mohammad Hamad
Other namesM Hamad
Postdoc at Dept of Electrical and Computer Engineering, Technical University of Munich
Verified email at tum.de - Homepage