Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Martín OchoaUniversidad de Los AndesVerified email at uniandes.edu.co
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
- Flavio ToffaliniRUB, Assistant ProfessorVerified email at rub.de
- Juan David Guarnizo HernandezPostDoc at ZHAWVerified email at zhaw.ch
- Daniele AntonioliEURECOMVerified email at eurecom.fr
- Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
- Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg
- David K Y YauSingapore University of Technology and DesignVerified email at sutd.edu.sg
- Zhongyuan HauImperial College LondonVerified email at imperial.ac.uk
- Sandra Julieta RuedaUniversidad de Los Andes, ColombiaVerified email at uniandes.edu.co
Follow
John H. Castellanos
Cybersecurity researcher, Hitachi Energy Research
Verified email at hitachienergy.com