Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumEmail verificata su rub.de
- Sebastian SchinzelMünster University of Applied SciencesEmail verificata su fh-muenster.de
- Tibor JagerUniversity of WuppertalEmail verificata su uni-wuppertal.de
- Christian MainkaRuhr University BochumEmail verificata su rub.de
- Christopher MeyerReserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University BochumEmail verificata su rub.de
- Yuval ShavittTel Aviv UniversityEmail verificata su eng.tau.ac.il
- Nils GruschkaUniversity of Oslo, NorwayEmail verificata su ifi.uio.no
- Mario HeiderichPhD, Ruhr-University BochumEmail verificata su rub.de
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringEmail verificata su umich.edu
- David AdrianIndependentEmail verificata su umich.edu
- Nadia HeningerUniversity of California San DiegoEmail verificata su cs.ucsd.edu
- Shaanan CohneyUniversity of MelbourneEmail verificata su unimelb.edu.au
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Erik TewsUniversity of TwenteEmail verificata su utwente.nl
- Marcus NiemietzNiederrhein University of Applied Sciences / Hackmanit GmbHEmail verificata su mniemietz.de
- Philipp JovanovicUniversity College LondonEmail verificata su jovanovic.io
- Aaron Zaunerlambda: resilient.systemsEmail verificata su azet.org
- Christian WietfeldProfessor for Communication Networks, TU Dortmund UniversityEmail verificata su tu-dortmund.de
- Mohamad SbeitiTechnical University of DortmundEmail verificata su tu-dortmund.de
- Martin GrotheSenior Cyber Security Architect @ EYEmail verificata su rub.de