Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martin DegelingAI ForensicsVerified email at ruhr-uni-bochum.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Florian SchaubUniversity of MichiganVerified email at umich.edu
Henry HosseiniUniversity of MünsterVerified email at wi.uni-muenster.de
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christopher LentzschIAW, Ruhr-University BochumVerified email at ruhr-uni-bochum.de
Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
Theodor SchnitzlerAssistant Professor at Maastricht UniversityVerified email at maastrichtuniversity.nl
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Franziska HerbertPhD Student @ Ruhr University BochumVerified email at ruhr-uni-bochum.de
Thomas HupperichEuropean Research Center for Information Systems, University Münster, GermanyVerified email at ercis.de
Steffen BeckerResearch Center for Trustworthy Data Science and Security, RUB, MPI-SPVerified email at rub.de
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Alina NesenPurdue University, Ph.D.Verified email at purdue.edu
Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
Shomir WilsonAssociate Professor, Pennsylvania State UniversityVerified email at psu.edu
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Siddhant AroraGraduate Student, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Rex ChenCarnegie Mellon UniversityVerified email at cs.cmu.edu