Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Cornelius AschermannRuhr University BochumVerified email at hexgolems.com
Sergej SchumiloRuhr Universität BochumVerified email at rub.de
Moritz SchloegelCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Simon WörnerRuhr University BochumVerified email at rub.de
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Tim BlazytkoPhD student at Ruhr-Universitaet BochumVerified email at rub.de
Tobias ScharnowskiRuhr University BochumVerified email at rub.de
Moritz ContagRuhr-Universität BochumVerified email at rub.de
Nils BarsRuhr University BochumVerified email at rub.de
Eric GustafsonUC Santa BarbaraVerified email at cs.ucsb.edu
Marius MuenchAssistant Professor, University of BirminghamVerified email at bham.ac.uk
Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
Andrea JemmettVrije Universiteit AmsterdamVerified email at vu.nl
Joel FrankRuhr-Universität BochumVerified email at rub.de
Johannes WillboldRuhr-Universität BochumVerified email at rub.de
Carlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Efrén López-MoralesTexas A&M University-Corpus ChristiVerified email at islander.tamucc.edu
Gabriele MarraCISPA Helmholtz Center for Information SecurityVerified email at cispa.de