Get my own profile
Public access
View all18 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Alexander PretschnerProfessor of Computer Science, Technische Universität MünchenVerified email at in.tum.de
Juan David Guarnizo HernandezPostDoc at ETHZVerified email at inf.ethz.ch
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Jesús SolanoETH ZürichVerified email at inf.ethz.ch
Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchVerified email at hitachienergy.com
Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
Jan JürjensUniversität Koblenz-Landau, GermanyVerified email at jurjens.de
Lizzy TenganaEricsson ABVerified email at ericsson.com
Esteban RiveraInstitute for Automotive Engineering, TUMVerified email at tum.de
Chuadhry Mujeeb AhmedNewcastle UniversityVerified email at newcastle.ac.uk
Alejandra CastelblancoPhD Candidate, TUM and Helmholtz Center MunichVerified email at helmholtz-muenchen.de
Sebastian BanescuQuantstampVerified email at quantstamp.com
Andrei SabelfeldChalmers University of TechnologyVerified email at chalmers.se
Boris KöpfAzure Research, MicrosoftVerified email at microsoft.com
Sudipta ChattopadhyayAssociate Professor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Mohammad Torabi DashtiETH ZurichVerified email at duck.com
Jorge CuellarUni Passau, Univ de los Andes (Bogota)Verified email at gw.uni-passau.de