Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Martin JohnsProfessor of Computer Science, TU BraunschweigVerified email at tu-braunschweig.de
- Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Eduardo Vela NavaSecurity Engineer, Google Inc.Verified email at google.com
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Michele SpagnuoloGoogleVerified email at google.com
- Lukas WeichselbaumGoogle, iseclabVerified email at weichselbaum.biz
- Artur JancGoogleVerified email at google.com
- Stephan PfistnerSAPVerified email at sap.com
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mario HeiderichPhD, Ruhr-University BochumVerified email at rub.de
- Bastian BraunPhD student, ISL, University of PassauVerified email at sec.uni-passau.de
- Benjamin FleschPhD fellow, Center for Business Data Analytics (cbsBDA), Copenhagen Business SchoolVerified email at cbs.dk
- Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
- Marius MuschTU BraunschweigVerified email at tu-braunschweig.de
- Manuel KarlTU BraunschweigVerified email at tu-braunschweig.de