Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Harshad SathayeETH ZurichVerified email at inf.ethz.ch
- Domien SchepersNortheastern UniversityVerified email at northeastern.edu
- Ramya Jayaram MastiAmpere ComputingVerified email at amperecomputing.com
- Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Mathy VanhoefDistriNet, KU LeuvenVerified email at kuleuven.be
- Pau ClosasAssociate Professor of ECE, Northeastern UniversityVerified email at northeastern.edu
- Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mridula SinghCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Narmeen ShafqatNortheastern UniversityVerified email at northeastern.edu
- Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
- Lothar ThieleProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
- Devendra RaiSwiss Federal Institute, ZurichVerified email at tik.ee.ethz.ch
- Patrick LeuETH ZurichVerified email at inf.ethz.ch
- Evangelos BitsikasDoctoral Researcher, Northeastern UniversityVerified email at northeastern.edu
- Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
- Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
- Luka MalisaETH ZurichVerified email at inf.ethz.ch
- Gerald LaMountainPhD Candidate, Northeastern UniversityVerified email at northeastern.edu