Get my own profile
Public access
View all26 articles
1 article
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
David RupprechtRuhr-University BochumVerified email at rub.de
Katharina KohlsRadboud UniversityVerified email at cs.ru.nl
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Kai JansenPHYSEC GmbHVerified email at physec.de
Kasper RasmussenUniversity of OxfordVerified email at cs.ox.ac.uk
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Jens B. SchmittProfessor of Computer Science, University of KaiserslauternVerified email at cs.uni-kl.de
Vincent Lendersarmasuisse, Cyber-Defence CampusVerified email at lenders.ch
Matthias SchäferUniversity of KaiserslauternVerified email at cs.uni-kl.de
Theodor SchnitzlerResearch Center Trustworthy Data Science and Security and TU DortmundVerified email at tu-dortmund.de
Liang NiuNew York UniversityVerified email at nyu.edu
Mathy Vanhoefimec-DistriNet, KU LeuvenVerified email at nyu.edu
Shujaat MirzaNew York UniversityVerified email at nyu.edu
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Adrian DabrowskiUniversity of California, IrvineVerified email at uci.edu
Nian XueNew York UniversityVerified email at nyu.edu
Andre PawlowskiChair for Systems Security, Ruhr-University BochumVerified email at rub.de
Ala DarabsehResearch Assistant, NYUADVerified email at nyu.edu