Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Martina ZitterbartVerified email at kit.edu
Travis MayberryUS Naval AcademyVerified email at usna.edu
Hans-Joachim HofResearch Professor on Automotive Cybersecurity at Technische Hochschule IngolstadtVerified email at thi.de
Refik MolvaProfessor EURECOMVerified email at eurecom.fr
Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
Roland BlessKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
Kaoutar ElkhiyaouiIBM ResearchVerified email at zurich.ibm.com
Tarik MoatazBrown UniversityVerified email at brown.edu
Anil KurmusIBM Research Europe - ZurichVerified email at zurich.ibm.com
Artur HeckerHuawei TechnologiesVerified email at hecker.info
Houda LabiodTelecom ParisTechVerified email at telecom-paristech.fr
Triet Vo-HuuNortheastern UniversityVerified email at ccs.neu.edu
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
Ioannis KoltsidasAxelera AIVerified email at google.com
Kaan OnarliogluAkamai TechnologiesVerified email at iseclab.org
William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
Melek ÖnenEURECOMVerified email at eurecom.fr