Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Martin DegelingStiftung Neue VerantwortungVerified email at ruhr-uni-bochum.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Florian SchaubUniversity of MichiganVerified email at umich.edu
- Henry HosseiniUniversity of MünsterVerified email at wi.uni-muenster.de
- Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Christopher LentzschIAW, Ruhr-University BochumVerified email at ruhr-uni-bochum.de
- Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
- Theodor SchnitzlerAssistant Professor at Maastricht UniversityVerified email at maastrichtuniversity.nl
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
- Franziska HerbertPhD Student @ Ruhr University BochumVerified email at ruhr-uni-bochum.de
- Thomas HupperichEuropean Research Center for Information Systems, University Münster, GermanyVerified email at ercis.de
- Steffen BeckerResearch Center for Trustworthy Data Science and Security, RUB, MPI-SPVerified email at rub.de
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Alina NesenPurdue University, Ph.D.Verified email at purdue.edu
- Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
- Shomir WilsonAssociate Professor, Pennsylvania State UniversityVerified email at psu.edu
- Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Siddhant AroraGraduate Student, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Rex ChenCarnegie Mellon UniversityVerified email at cs.cmu.edu