Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Harshad SathayeETH ZurichVerified email at inf.ethz.ch
- Domien SchepersNortheastern UniversityVerified email at northeastern.edu
- Ramya Jayaram MastiAmpere ComputingVerified email at amperecomputing.com
- Mathy VanhoefDistriNet, KU LeuvenVerified email at kuleuven.be
- Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mridula SinghCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Lothar ThieleProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
- Devendra RaiSwiss Federal Institute, ZurichVerified email at tik.ee.ethz.ch
- Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
- Patrick LeuETH ZurichVerified email at inf.ethz.ch
- Pau ClosasAssociate Professor of ECE, Northeastern UniversityVerified email at northeastern.edu
- Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
- Luka MalisaETH ZurichVerified email at inf.ethz.ch
- Narmeen ShafqatNortheastern UniversityVerified email at northeastern.edu
- Gerald LaMountainPhD Candidate, Northeastern UniversityVerified email at northeastern.edu
- Sashank NarainAssistant Professor, University of Massachusetts LowellVerified email at uml.edu
- Thomas LocherETH ZurichVerified email at tik.ee.ethz.ch