Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Rawad BitarResearch Group Leader (and Habiliation Candidate), Technical University of MunichVerified email at tum.de
- Antonia Wachter-ZehProfessor at Technical University of Munich (TUM)Verified email at tum.de
- Christoph HofmeisterPhD Student, Technical University of MunichVerified email at tum.de
- Deniz GunduzProfessor of Information Processing, Imperial College LondonVerified email at imperial.ac.uk
- Marvin XhemrishiTechnical University of MunichVerified email at tum.de
- Thomas SchambergerChair of Security in Information Technology, Technical University of MunichVerified email at tum.de
- Nir WeinbergerAssistant ProfessorVerified email at technion.ac.il
- SALIM EL ROUAYHEBRutgers UniversityVerified email at scarletmail.rutgers.edu
- Ghadir AyacheRutgers UniversityVerified email at scarletmail.rutgers.edu
- Serge Kas HannaJunior Professor, CNRS, Côte d'Azur UniversityVerified email at univ-cotedazur.fr