Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
- Xiaoyuan WuCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
- Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Chris KanichUniversity of Illinois at ChicagoVerified email at uic.edu
- Mir Masood AliPhD Student, University of Illinois ChicagoVerified email at uic.edu
- Rahel A. FainchteinJohns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
- Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
- Irwin ReyesTwo Six TechnologiesVerified email at twosixtech.com