Get my own profile
Public access
View all26 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Alexandra DmitrienkoWürzburg UniversityVerified email at uni-wuerzburg.de
Christopher LiebchenTechnische Universität DarmstadtVerified email at google.com
Marcel WinandyinnogyVerified email at innogy.com
Per LarsenProject Scientist at University of California, IrvineVerified email at uci.edu
Thorsten HolzRuhr-Universität BochumVerified email at rub.de
Dr. Stephen CraneImmunant Inc.Verified email at uci.edu
Sven BugielCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Fabian MonroseProfessor of Computer Science, UNC Chapel HillVerified email at cs.unc.edu
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Stefan NürnbergerCISPA, Saarland University, Saarland Informatics CampusVerified email at cispa.saarland
Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
Dean SullivanUniversity of FloridaVerified email at ufl.edu
Ralf HundRuhr-Universität BochumVerified email at rub.de
Andrew PaverdMicrosoft ResearchVerified email at microsoft.com
Stephan HeuserIntelVerified email at heuser.ws
stefan brunthalerProfessor, Secure Software Engineering @ CODE National Research InstituteVerified email at unibw.de
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
Mauro ContiFull Professor at University of Padua - Affiliate Prof. at TU Delft and UW SeattleVerified email at math.unipd.it
Răzvan DeaconescuAssistant Professor at University POLITEHNICA of BucharestVerified email at cs.pub.ro