Get my own profile
Public access
View all31 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Alexandra DmitrienkoWürzburg UniversityVerified email at uni-wuerzburg.de
Christopher LiebchenTechnische Universität DarmstadtVerified email at google.com
Marcel WinandyinnogyVerified email at innogy.com
Per LarsenImmunant, Inc.Verified email at immunant.com
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Fabian MonroseProfessor of Computer Science, UNC Chapel HillVerified email at cs.unc.edu
Dr. Stephen CraneImmunant Inc.Verified email at uci.edu
Stephan HeuserIntelVerified email at heuser.ws
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Stefan NürnbergerELEXIR AGVerified email at elexir.eu
Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
Dean SullivanUniversity of New HampshireVerified email at unh.edu
Andrew PaverdMicrosoft ResearchVerified email at microsoft.com
Ralf HundRuhr-Universität BochumVerified email at rub.de
stefan brunthalerProfessor, Secure Software Engineering @ CODE National Research InstituteVerified email at unibw.de
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it