Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Katharina KohlsRadboud UniversityVerified email at cs.ru.nl
David RupprechtRuhr-University BochumVerified email at rub.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Kai JansenRuhr-University BochumVerified email at rub.de
Kasper RasmussenUniversity of OxfordVerified email at cs.ox.ac.uk
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Jens B. SchmittProfessor of Computer Science, University of KaiserslauternVerified email at cs.uni-kl.de
Vincent Lendersarmasuisse, Cyber-Defence CampusVerified email at lenders.ch
Matthias SchäferUniversity of KaiserslauternVerified email at cs.uni-kl.de
Theodor SchnitzlerTechnische Universität DortmundVerified email at tu-dortmund.de
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Mathy Vanhoefimec-DistriNet, KU LeuvenVerified email at nyu.edu
Adrian DabrowskiUniversity of California, IrvineVerified email at uci.edu
Shujaat MirzaNew York UniversityVerified email at nyu.edu
Nian XueNew York UniversityVerified email at nyu.edu
Liang NiuNew York UniversityVerified email at nyu.edu
Andre PawlowskiChair for Systems Security, Ruhr-University BochumVerified email at rub.de
Ala DarabsehResearch Assistant, NYUADVerified email at nyu.edu