Get my own profile
Public access
View all14 articles
3 articles
available
not available
Based on funding mandates
Co-authors
vassilis prevelakisGuest Professor of Computer Security, TU BraunschweigVerified email at ida.ing.tu-bs.de
Rolf ErnstProfessor at Institute of Computer and Network Engineering, TU Braunschweig, GermanyVerified email at tu-bs.de
Sebastian SteinhorstAssociate Professor, Dept. of Electrical and Computer Engineering, Technical University of MunichVerified email at tum.de
Marcus NolteTU Braunschweig, Institut f. Regelungstechnik, AG EFSVerified email at ifr.ing.tu-bs.de
Jan LauingerTechnical University of MunichVerified email at tum.de
Marinos TsantekidisPhD researcher, Technical University BraunschweigVerified email at ida.ing.tu-bs.de
Zain A. H. HammadehInstitute for Software Technology, German Aerospace Center (DLR)Verified email at dlr.de
Johannes SchlatowGenode LabsVerified email at genode-labs.com
Muhammad Ali SiddiqiTU DelftVerified email at tudelft.nl
Christos StrydisAssociate professor, Neuroscience Department, Erasmus Medical CenterVerified email at erasmusmc.nl
Robert SeepersPhD Student Erasmus MCVerified email at erasmusmc.nl
Emanuel RegnathTechnical University of MunichVerified email at tum.de
Jens ErnstbergerTechnical University of MunichVerified email at tum.de
Mudassar Aslam (PhD)National University of Computer and Emerging Sciences (FAST-NUCES)Verified email at nu.edu.pk
Shahid RazaDirector of Cybersecurity @ RISE Sweden (formerly SICS) | Associate Professor, UppsalaVerified email at ri.se
jihane najarDoctoranteVerified email at ida.ing.tu-bs.de
Lea SchönbergerResearch Associate (PhD Student), Faculty of Computer Science, TU Dortmund UniversityVerified email at tu-dortmund.de
Follow
Mohammad Hamad
Postdoc at Dept of Electrical and Computer Engineering, Technical University of Munich
Verified email at tum.de - Homepage