Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- vassilis prevelakisGuest Professor of Computer Security, TU BraunschweigVerified email at ida.ing.tu-bs.de
- Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
- Jan LauingerTechnical University of MunichVerified email at tum.de
- Marinos TsantekidisPhD researcher, Technical University BraunschweigVerified email at ida.ing.tu-bs.de
- Rolf ErnstProfessor at Institute of Computer and Network Engineering, TU Braunschweig, GermanyVerified email at tu-bs.de
- Zain A. H. HammadehInstitute for Software Technology, German Aerospace Center (DLR)Verified email at dlr.de
- Marcus NolteTU Braunschweig, Institut f. Regelungstechnik, AG EFSVerified email at ifr.ing.tu-bs.de
- Emanuel RegnathTechnical University of MunichVerified email at tum.de
- Muhammad Ali SiddiqiTU DelftVerified email at tudelft.nl
- Christos StrydisAssociate professor, Neuroscience Department, Erasmus Medical CenterVerified email at erasmusmc.nl
- Robert SeepersPhD Student Erasmus MCVerified email at erasmusmc.nl
- Johannes SchlatowGenode LabsVerified email at genode-labs.com
- Jens ErnstbergerTechnical University of MunichVerified email at tum.de
- Lea SchönbergerComputer Scientist / Independent ResearcherVerified email at schoenberger.rocks
- Mudassar Aslam (PhD)Oxford Brookes UniversityVerified email at brookes.ac.uk
- Shahid RazaFull Professor & Cybersecurity Chair, University of Glasgow | Research Director Cybersecurity@RISEVerified email at glasgow.ac.uk
- Monowar HasanAssistant Professor, School of EECS, Washington State UniversityVerified email at wsu.edu
- jihane najarDoctoranteVerified email at ida.ing.tu-bs.de
Follow
Mohammad Hamad
Other namesM Hamad
Department of Computer Engineering. Technical University of Munich
Verified email at tum.de - Homepage