Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Matthias FasslPostdoctoral Researcher, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Anna-Marie OrtloffUniversität BonnVerified email at cs.uni-bonn.de
Adrian DabrowskiUniversity of Applied Sciences FH Campus WienVerified email at fh-campuswien.ac.at
Matthew SmithProfessor of Computer Science, Universität BonnVerified email at cs.uni-bonn.de
Florin MartiusUniversity of BonnVerified email at cs.uni-bonn.de
Divyanshu BhardwajCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Dañiel GerhardtCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
David SchmidtUniversity of ViennaVerified email at univie.ac.at
Magdalena SteinböckTU WienVerified email at tuwien.ac.at
Martina LindorferAssociate Professor at TU WienVerified email at tuwien.ac.at
Karola MarkyProfessor of Computer Science, Ruhr University BochumVerified email at rub.de
Tangila Islam TanniUniversity of Central FloridaVerified email at ucf.edu
Yan SolihinCharles N. Millican Chair Professor of Computer Science at UCF, Director for Cybersecurity andVerified email at ucf.edu
Rebecca PanskusRuhr University BochumVerified email at ruhr-uni-bochum.de
Filipo SharevskiDePaul UniversityVerified email at cdm.depaul.edu
Jennifer Vander LoopPhD Student, DePaul UniversityVerified email at depaul.edu