Get my own profile
Public access
View all37 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Alexandra DmitrienkoWürzburg UniversityVerified email at uni-wuerzburg.de
- Christopher LiebchenTechnische Universität DarmstadtVerified email at google.com
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Per LarsenImmunant, Inc.Verified email at immunant.com
- Dr. Stephen CraneImmunant Inc.Verified email at uci.edu
- Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyVerified email at ece.gatech.edu
- Stephan HeuserIntelVerified email at heuser.ws
- Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- stefan brunthalerProfessor, Secure Software Engineering @ CODE National Research InstituteVerified email at unibw.de
- Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
- Dean SullivanUniversity of New HampshireVerified email at unh.edu
- Stefan NürnbergerVeecle GmbHVerified email at veecle.io
- Andrew PaverdMicrosoftVerified email at microsoft.com
- Ralf HundRuhr-Universität BochumVerified email at rub.de
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
- Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it