Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Martín OchoaZurich University of Applied SciencesVerified email at 8ar.ch
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityVerified email at bgu.ac.il
Yair MeidanExperienced Data Scientist / Applied Machine Learning ResearcherVerified email at post.bgu.ac.il
Michael BohadanaVerified email at post.bgu.ac.il
Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchVerified email at hitachienergy.com
Amit TambeResearcher, F-SecureVerified email at f-secure.com
Paweł SzałachowskiVerified email at google.com
Alexander BinderChair Computer Vision, OvGU, Magdeburg, GermanyVerified email at ovgu.de
Yi Xiang Marcus TanSingapore University of Technology and DesignVerified email at mymail.sutd.edu.sg
Penny ChongIBM Research, SingaporeVerified email at ibm.com
Bithin AlangotHuawei Munich Research CenterVerified email at huawei.com
Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg