Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverEmail verificata su itsec.uni-hannover.de
- Adam J AvivThe George Washington UniversityEmail verificata su email.gwu.edu
- Maximilian GollaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Daniel V BaileyRuhr University BochumEmail verificata su sth.rub.de
- Florian Marius FarkePhD Candidate @ Ruhr University BochumEmail verificata su rub.de
- Collins W. MunyendoThe George Washington UniversityEmail verificata su gwu.edu
- Elizabeth StobertCarleton UniversityEmail verificata su carleton.ca
- Sanchari DasUniversity of DenverEmail verificata su du.edu
- Iulian NeamtiuProfessor of Computer Science, New Jersey Institute of TechnologyEmail verificata su njit.edu
- Tim FormanLTJG, United States NavyEmail verificata su ddg123.navy.mil
- Blase UrAssociate Professor, University of ChicagoEmail verificata su uchicago.edu
- Alexandra NisenoffCarnegie Mellon UniversityEmail verificata su cmu.edu
- Faiza TAZIUniversity of DenverEmail verificata su du.edu
- Leona LassakRuhr Universität BochumEmail verificata su rub.de
- Alexander MayRuhr-Universität BochumEmail verificata su rub.de
- andrick adhikariPhD scholar, University of DenverEmail verificata su du.edu
- Hunter Allen DyerGeorge Washington UniversityEmail verificata su gwmail.gwu.edu
- Angel FernandesMasters Student, Northeastern UniversityEmail verificata su northeastern.edu
Segui