Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martin DegelingStiftung Neue VerantwortungVerified email at ruhr-uni-bochum.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Florian SchaubUniversity of MichiganVerified email at umich.edu
Henry HosseiniUniversity of MünsterVerified email at wi.uni-muenster.de
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christopher LentzschIAW, Ruhr-University BochumVerified email at ruhr-uni-bochum.de
Florian Marius FarkePhD Candidate @ Ruhr University BochumVerified email at rub.de
Theodor SchnitzlerAssistant Professor at Maastricht UniversityVerified email at maastrichtuniversity.nl
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Franziska HerbertPhD Student @ Ruhr University BochumVerified email at ruhr-uni-bochum.de
Steffen BeckerRuhr University Bochum, Max Planck Institute for Security and PrivacyVerified email at rub.de
Thomas HupperichEuropean Research Center for Information Systems, University Münster, GermanyVerified email at ercis.de
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Alina NesenPurdue University, Ph.D.Verified email at purdue.edu
Ben StockCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
Sabrina AmftCISPA Helmholtz Center for Information SecurityVerified email at sec.uni-hannover.de
Torsten EymannProfessor für Wirtschaftsinformatik, Universität BayreuthVerified email at uni-bayreuth.de
Shomir WilsonAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu