Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
Sebastian SchinzelMünster University of Applied Sciences, Fraunhofer SIT, AtheneVerified email at fh-muenster.de
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Christian MainkaRuhr University BochumVerified email at rub.de
Christopher MeyerReserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University BochumVerified email at rub.de
Yuval ShavittTel Aviv UniversityVerified email at eng.tau.ac.il
Nils GruschkaProfessor, University of Oslo, NorwayVerified email at ifi.uio.no
Mario HeiderichPhD, Ruhr-University BochumVerified email at rub.de
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
David AdrianIndependentVerified email at umich.edu
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Shaanan CohneyUniversity of MelbourneVerified email at unimelb.edu.au
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Erik TewsUniversity of TwenteVerified email at utwente.nl
Marcus NiemietzNiederrhein University of Applied SciencesVerified email at mniemietz.de
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Aaron Zaunerlambda: resilient.systemsVerified email at azet.org
Christian WietfeldProfessor for Communication Networks, TU Dortmund UniversityVerified email at tu-dortmund.de
Mohamad SbeitiTechnical University of DortmundVerified email at tu-dortmund.de
Martin GrotheSenior Cyber Security Architect @ EYVerified email at rub.de