Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
vassilis prevelakisGuest Professor of Computer Security, TU BraunschweigVerified email at ida.ing.tu-bs.de
Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
Jan LauingerTechnical University of MunichVerified email at tum.de
Marinos TsantekidisPhD researcher, Technical University BraunschweigVerified email at ida.ing.tu-bs.de
Rolf ErnstProfessor at Institute of Computer and Network Engineering, TU Braunschweig, GermanyVerified email at tu-bs.de
Marcus NolteTU Braunschweig, Institut f. Regelungstechnik, AG EFSVerified email at ifr.ing.tu-bs.de
Zain A. H. HammadehInstitute for Software Technology, German Aerospace Center (DLR)Verified email at dlr.de
Emanuel RegnathTechnical University of MunichVerified email at tum.de
Muhammad Ali SiddiqiTU DelftVerified email at tudelft.nl
Christos StrydisAssociate professor, Neuroscience Department, Erasmus Medical CenterVerified email at erasmusmc.nl
Robert SeepersPhD Student Erasmus MCVerified email at erasmusmc.nl
Johannes SchlatowGenode LabsVerified email at genode-labs.com
Jens ErnstbergerTechnical University of MunichVerified email at tum.de
Mudassar Aslam (PhD)National University of Computer and Emerging Sciences (FAST-NUCES)Verified email at nu.edu.pk
Lea SchönbergerComputer Scientist (PhD thesis defended)Verified email at tu-dortmund.de
Shahid RazaDirector of Cybersecurity Unit @ RISE Sweden | Professor of Cybersecurity, Mälardalen Uni. SwedenVerified email at ri.se
jihane najarDoctoranteVerified email at ida.ing.tu-bs.de
Follow
Mohammad Hamad
Other namesM Hamad
Department of Computer Engineering. Technical University of Munich
Verified email at tum.de - Homepage