Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Petr HanáčekVUTBRVerified email at vutbr.cz
Paweł SzałachowskiVerified email at google.com
Martín OchoaZurich University of Applied SciencesVerified email at zhaw.ch
Dominik BreitenbacherMalware Researcher, ESETVerified email at eset.com
Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Juan David Guarnizo HernandezPostDoc at ETHZVerified email at inf.ethz.ch
Daniël ReijsbergenNanyang Technological UniversityVerified email at ntu.edu.sg
Maroš BarabasResearcherVerified email at vutbr.cz
Kamil MalinkaBrno University of Technology/Masaryk universityVerified email at fit.vutbr.cz
Alexander BinderAssociate Professor, Singapore Institute of Technology (SIT)Verified email at singaporetech.edu.sg
John H. CastellanosPostDoc, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yan Lin AungPostdoctoral Research Fellow, Singapore University of Technology and DesignVerified email at sutd.edu.sg
Petr Chmelar®esistineVerified email at resistine.com
Richard SchumiSingapore Management University (SMU)Verified email at smu.edu.sg
Siwei SunChinese Academy of SciencesVerified email at ucas.ac.cn
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Fran CasinoRovira i Virgili University & Athena Research CenterVerified email at urv.cat
Lukáš HellebrandtPh.D. Student, Faculty of Information Technology, Brno University of TechnologyVerified email at fit.vutbr.cz
Follow
Ivan Homoliak
Research Scientist, Brno University of Technology
Verified email at fit.vutbr.cz - Homepage