Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- didier sornetteSUSTech, ShenzhenEmail verificata su ethz.ch
- John ChuangProfessor, UC Berkeley School of InformationEmail verificata su ischool.berkeley.edu
- Alain MermoudCyber-Defence Campus, armasuisse Science and Technology, SwitzerlandEmail verificata su ethz.ch
- Dimitri Percia DavidProfessor, University of Applied Sciences of Western SwitzerlandEmail verificata su hevs.ch
- Benjamin JohnsonUniversity of California, BerkeleyEmail verificata su ischool.berkeley.edu
- Nada KojovicUniversity of GenevaEmail verificata su unige.ch
- Marie SchaerFaculty of Medicine, Geneva University, SwitzerlandEmail verificata su unige.ch
- Mingyi ZhaoNotionEmail verificata su makenotion.com
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Russell Cameron ThomasPhD student, Department of Computational and Data Sciences, George Mason UniversityEmail verificata su gmu.edu
- Joan SchmitProfessor of Risk Management and Insurance, University of Wisconsin-MadisonEmail verificata su bus.wisc.edu
- Shaun WangSouthern University of Science and Technology, ChinaEmail verificata su risklighthouse.com
- Gregory FalcoCornell University, MIT CSAIL, HarvardEmail verificata su mit.edu
- Lawrence A. GordonUniversity of Maryland, Smith School of BusinessEmail verificata su umd.edu
- Spencer WheatleySenior Scientist, ETH ZürichEmail verificata su ethz.ch
- Georg von KroghProfessor, ETH ZurichEmail verificata su ethz.ch
- Sebastian SpaethUniversity of HamburgEmail verificata su uni-hamburg.de
- Shreyasvi NatrajUniversity of GenevaEmail verificata su unige.ch
- Sharada Prasanna MohantyAIcrowd SA, SwitzerlandEmail verificata su epfl.ch
- Martin BurkhartCyber-Defence Campus, SwitzerlandEmail verificata su ar.admin.ch