Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
- Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
- Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
- Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
- Collins W. MunyendoThe George Washington UniversityVerified email at gwu.edu
- Elizabeth StobertCarleton UniversityVerified email at carleton.ca
- Sanchari DasUniversity of DenverVerified email at du.edu
- Iulian NeamtiuProfessor of Computer Science, New Jersey Institute of TechnologyVerified email at njit.edu
- Leona LassakRuhr Universität BochumVerified email at rub.de
- Tim FormanLTJG, United States NavyVerified email at ddg123.navy.mil
- Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
- Alexandra NisenoffCarnegie Mellon UniversityVerified email at cmu.edu
- Faiza TAZIUniversity of DenverVerified email at du.edu
- Alexander MayRuhr-Universität BochumVerified email at rub.de
- andrick adhikariPhD scholar, University of DenverVerified email at du.edu
- Hunter Allen DyerGeorge Washington UniversityVerified email at gwmail.gwu.edu
- Angel FernandesMasters Student, Northeastern UniversityVerified email at northeastern.edu