Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Dorothea KolossaTechnische Universität BerlinVerified email at tu-berlin.de
- Thorsten EisenhoferTechnische Universität BerlinVerified email at tu-berlin.de
- Joel FrankRuhr-Universität BochumVerified email at rub.de
- Asja FischerProfessor for Machine Learning, Ruhr University BochumVerified email at ini.rub.de
- Mario FritzFaculty CISPA Helmholtz Center for Information Security; Professor Saarland UniversityVerified email at cispa.de
- Katharina KohlsRuhr University BochumVerified email at rub.de
- Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jan WieleRuhr-Universität BochumVerified email at ruhr-uni-bochum.de
- Hossein HajipourCISPA − Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Merlin ChlostaCISPA Helmholtz Center for Information SecurityVerified email at rub.de
- Hojjat AghakhaniResearcher VMwareVerified email at vmware.com
- Christopher KruegelUniversity of California, Santa Barbara and VMware, Inc.Verified email at cs.ucsb.edu
- Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
- Sahar AbdelnabiAI Security Researcher, MicrosoftVerified email at microsoft.com
- Sina DäubenerRuhr University BochumVerified email at rub.de
- Rainer MartinProfessor of Information Technology and Communication Acoustics, Ruhr-Universität BochumVerified email at rub.de
- Antonio Emanuele CinàAssistant Professor @ University of GenoaVerified email at unige.it
- Lars SpeckemeierUniversity College LondonVerified email at ucl.ac.uk
- Alexandru NelusAWS GermanyVerified email at amazon.de