Get my own profile
Public access
View all15 articles
3 articles
available
not available
Based on funding mandates
Co-authors
vassilis prevelakisGuest Professor of Computer Security, TU BraunschweigVerified email at ida.ing.tu-bs.de
Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
Jan LauingerTechnical University of MunichVerified email at tum.de
Rolf ErnstProfessor at Institute of Computer and Network Engineering, TU Braunschweig, GermanyVerified email at tu-bs.de
Marcus NolteTU Braunschweig, Institut f. Regelungstechnik, AG EFSVerified email at ifr.ing.tu-bs.de
Marinos TsantekidisPhD researcher, Technical University BraunschweigVerified email at ida.ing.tu-bs.de
Zain A. H. HammadehInstitute for Software Technology, German Aerospace Center (DLR)Verified email at dlr.de
Emanuel RegnathTechnical University of MunichVerified email at tum.de
Muhammad Ali SiddiqiTU DelftVerified email at tudelft.nl
Christos StrydisAssociate professor, Neuroscience Department, Erasmus Medical CenterVerified email at erasmusmc.nl
Robert SeepersPhD Student Erasmus MCVerified email at erasmusmc.nl
Johannes SchlatowGenode LabsVerified email at genode-labs.com
Jens ErnstbergerTechnical University of MunichVerified email at tum.de
Mudassar Aslam (PhD)National University of Computer and Emerging Sciences (FAST-NUCES)Verified email at nu.edu.pk
Lea SchönbergerResearch Associate (PhD Student), Faculty of Computer Science, TU Dortmund UniversityVerified email at tu-dortmund.de
Shahid RazaDirector of Cybersecurity Unit @ RISE Sweden (formerly SICS) | Associate Professor, UppsalaVerified email at ri.se
jihane najarDoctoranteVerified email at ida.ing.tu-bs.de
Follow
Mohammad Hamad
Other namesM Hamad
Department of Computer Engineering. Technical University of Munich
Verified email at tum.de - Homepage