Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Martín OchoaZurich University of Applied SciencesVerified email at zhaw.ch
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityVerified email at bgu.ac.il
Yair MeidanPh.D., Data Scientist / Machine Learning Expert at eToroVerified email at post.bgu.ac.il
Michael BohadanaVerified email at post.bgu.ac.il
Ivan HomoliakResearch Scientist, Brno University of TechnologyVerified email at fit.vutbr.cz
Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
John H. CastellanosPostDoc, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Amit TambeResearcher, F-SecureVerified email at f-secure.com
Paweł SzałachowskiVerified email at google.com
Alexander BinderAssociate Professor, Singapore Institute of Technology (SIT)Verified email at singaporetech.edu.sg
Yi Xiang Marcus TanSingapore University of Technology and DesignVerified email at mymail.sutd.edu.sg
Penny ChongIBM Research, SingaporeVerified email at ibm.com
Bithin AlangotHuawei Munich Research CenterVerified email at huawei.com
Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg