Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Martín OchoaZurich University of Applied SciencesVerified email at zhaw.ch
- Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityVerified email at bgu.ac.il
- Yair MeidanExperienced Data Scientist / Applied Machine Learning ResearcherVerified email at post.bgu.ac.il
- Michael BohadanaVerified email at post.bgu.ac.il
- Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
- Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
- John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchVerified email at hitachienergy.com
- Amit TambeResearcher, F-SecureVerified email at f-secure.com
- Paweł SzałachowskiVerified email at google.com
- Alexander BinderChair Computer Vision, OvGU, Magdeburg, GermanyVerified email at ovgu.de
- Yi Xiang Marcus TanSingapore University of Technology and DesignVerified email at mymail.sutd.edu.sg
- Penny ChongIBM Research, SingaporeVerified email at ibm.com
- Bithin AlangotHuawei Munich Research CenterVerified email at huawei.com
- Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg