Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Martina ZitterbartVerified email at kit.edu
Travis MayberryUS Naval AcademyVerified email at usna.edu
Hans-Joachim HofResearch Professor on Automotive Security at Technische Hochschule IngolstadtVerified email at thi.de
Refik MolvaProfessor EURECOMVerified email at eurecom.fr
Roland BlessKarlsruhe Institute of Technology (KIT)Verified email at kit.edu
Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
Kaoutar ElkhiyaouiIBM ResearchVerified email at zurich.ibm.com
Tarik MoatazBrown UniversityVerified email at brown.edu
Anil KurmusIBM Research - ZurichVerified email at zurich.ibm.com
Artur HeckerHuawei TechnologiesVerified email at hecker.info
Houda LabiodTelecom ParisTechVerified email at telecom-paristech.fr
Triet Vo-HuuNortheastern UniversityVerified email at ccs.neu.edu
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
Ioannis KoltsidasAxelera AIVerified email at google.com
Kaan OnarliogluAkamai TechnologiesVerified email at iseclab.org
William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
Melek ÖnenEURECOMVerified email at eurecom.fr