Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- vassilis prevelakisGuest Professor of Computer Security, TU BraunschweigVerified email at ida.ing.tu-bs.de
- Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
- Jan LauingerTechnical University of MunichVerified email at tum.de
- Marinos TsantekidisPhD researcher, Technical University BraunschweigVerified email at ida.ing.tu-bs.de
- Rolf ErnstProfessor at Institute of Computer and Network Engineering, TU Braunschweig, GermanyVerified email at tu-bs.de
- Zain A. H. HammadehInstitute for Software Technology, German Aerospace Center (DLR)Verified email at dlr.de
- Marcus NolteTU Braunschweig, Institut f. Regelungstechnik, AG EFSVerified email at ifr.ing.tu-bs.de
- Emanuel RegnathTechnical University of MunichVerified email at tum.de
- Muhammad Ali SiddiqiTU DelftVerified email at tudelft.nl
- Christos StrydisAssociate professor, Neuroscience Department, Erasmus Medical CenterVerified email at erasmusmc.nl
- Robert SeepersPhD Student Erasmus MCVerified email at erasmusmc.nl
- Johannes SchlatowGenode LabsVerified email at genode-labs.com
- Jens ErnstbergerTechnical University of MunichVerified email at tum.de
- Lea SchönbergerComputer Scientist (PhD thesis defended)Verified email at tu-dortmund.de
- Mudassar Aslam (PhD)National University of Computer and Emerging Sciences (FAST-NUCES)Verified email at nu.edu.pk
- Shahid RazaDirector of Cybersecurity Unit @ RISE Sweden | Professor of Cybersecurity, Mälardalen Uni. SwedenVerified email at ri.se
- jihane najarDoctoranteVerified email at ida.ing.tu-bs.de
Follow
Mohammad Hamad
Other namesM Hamad
Department of Computer Engineering. Technical University of Munich
Verified email at tum.de - Homepage