Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Martina ZitterbartVerified email at kit.edu
- Travis MayberryUS Naval AcademyVerified email at usna.edu
- Hans-Joachim HofResearch Professor on Automotive Cybersecurity at Technische Hochschule IngolstadtVerified email at thi.de
- Refik MolvaProfessor EURECOMVerified email at eurecom.fr
- Roland BlessKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
- Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
- Kaoutar ElkhiyaouiIBM ResearchVerified email at zurich.ibm.com
- Tarik MoatazBrown UniversityVerified email at brown.edu
- Anil KurmusIBM Research Europe - ZurichVerified email at zurich.ibm.com
- Artur HeckerHuawei TechnologiesVerified email at hecker.info
- Houda LabiodTelecom ParisTechVerified email at telecom-paristech.fr
- Triet Vo-HuuNortheastern UniversityVerified email at ccs.neu.edu
- Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
- Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
- Ioannis KoltsidasAxelera AIVerified email at google.com
- Kaan OnarliogluAkamai TechnologiesVerified email at iseclab.org
- William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
- Melek ÖnenEURECOMVerified email at eurecom.fr