Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martina ZitterbartVerified email at kit.edu
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Travis MayberryUS Naval AcademyVerified email at usna.edu
Hans-Joachim HofProfessor für IT SicherheitVerified email at thi.de
Refik MolvaProfessor EURECOMVerified email at eurecom.fr
Roland BlessKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
Tarik MoatazBrown UniversityVerified email at brown.edu
Kaoutar ElkhiyaouiIBM ResearchVerified email at zurich.ibm.com
Anil KurmusIBM Research - ZurichVerified email at zurich.ibm.com
Artur HeckerHuawei TechnologiesVerified email at hecker.info
Houda LabiodTelecom ParisTechVerified email at telecom-paristech.fr
Triet Vo-HuuNortheastern UniversityVerified email at ccs.neu.edu
Ioannis KoltsidasAxelera AIVerified email at google.com
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
Travis GoodspeedVerified email at radiantmachines.com
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, HBKU-College of ScienceVerified email at hbku.edu.qa
Melek ÖnenEURECOMVerified email at eurecom.fr
William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu