Get my own profile
Public access
View all45 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.deAlexandra DmitrienkoUniversity of Duisburg-EssenVerified email at uni-due.de
Christopher LiebchenTechnische Universität DarmstadtVerified email at google.comThorsten HolzMax Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Per LarsenImmunant, Inc.Verified email at immunant.com
Dr. Stephen CraneImmunant Inc.Verified email at uci.edu
Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyVerified email at ece.gatech.edu
Stephan HeuserIntelVerified email at heuser.wsSven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
stefan brunthalerProfessor, Secure Software Engineering @ CODE National Research InstituteVerified email at unibw.de
Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
Dean SullivanUniversity of New HampshireVerified email at unh.edu
Stefan NürnbergerVeecle GmbHVerified email at veecle.io
Andrew PaverdMicrosoftVerified email at microsoft.com
Ralf HundRuhr-Universität BochumVerified email at rub.deGene Tsudik (it/it/its)Peter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
Mauro ContiIEEE Fellow - Prof.@University of Padua - Wallenberg WASP Guest.Prof.@Örebro U.- Affiliate Prof.@UWVerified email at math.unipd.it