Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dorothea KolossaTechnische Universität BerlinEmail verificata su tu-berlin.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Thorsten EisenhoferTechnische Universität BerlinEmail verificata su tu-berlin.de
- Joel FrankRuhr-Universität BochumEmail verificata su rub.de
- Asja FischerProfessor for Machine Learning, Ruhr University BochumEmail verificata su ini.rub.de
- Katharina KohlsRuhr University BochumEmail verificata su rub.de
- Maximilian GollaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Jan WieleRuhr-Universität BochumEmail verificata su ruhr-uni-bochum.de
- Mario FritzFaculty CISPA Helmholtz Center for Information Security; Professor Saarland UniversityEmail verificata su cispa.de
- Hojjat AghakhaniResearcher VMwareEmail verificata su vmware.com
- Christopher KruegelUniversity of California, Santa Barbara and VMware, Inc.Email verificata su cs.ucsb.edu
- Giovanni VignaUC Santa Barbara and VMwareEmail verificata su cs.ucsb.edu
- Sina DäubenerRuhr University BochumEmail verificata su rub.de
- Rainer MartinProfessor of Information Technology and Communication Acoustics, Ruhr-Universität BochumEmail verificata su rub.de
- Hossein HajipourCISPA − Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Merlin ChlostaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Lars SpeckemeierUniversity College LondonEmail verificata su ucl.ac.uk
- Alexandru NelusAWS GermanyEmail verificata su amazon.de
- Nico SchillerRuhr University BochumEmail verificata su rub.de
- Moritz SchloegelCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de