Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Harshad SathayeETH ZurichEmail verificata su inf.ethz.ch
- Domien SchepersNortheastern UniversityEmail verificata su northeastern.edu
- Ramya Jayaram MastiAmpere ComputingEmail verificata su amperecomputing.com
- Mathy VanhoefDistriNet, KU LeuvenEmail verificata su kuleuven.be
- Guevara NoubirProfessor of Computer Science, Northeastern UniversityEmail verificata su ccs.neu.edu
- Boris DanevDoctor in Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Mridula SinghCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Lothar ThieleProfessor of Computer Engineering, ETH ZurichEmail verificata su ethz.ch
- Devendra RaiSwiss Federal Institute, ZurichEmail verificata su tik.ee.ethz.ch
- Vincent LendersCyber-Defence Campus, armasuisseEmail verificata su lenders.ch
- Patrick LeuETH ZurichEmail verificata su inf.ethz.ch
- Pau ClosasAssociate Professor of ECE, Northeastern UniversityEmail verificata su northeastern.edu
- Aurélien FrancillonProfessor, EURECOMEmail verificata su eurecom.fr
- Luka MalisaETH ZurichEmail verificata su inf.ethz.ch
- Narmeen ShafqatNortheastern UniversityEmail verificata su northeastern.edu
- Gerald LaMountainPhD Candidate, Northeastern UniversityEmail verificata su northeastern.edu
- Sashank NarainAssistant Professor, University of Massachusetts LowellEmail verificata su uml.edu
- Thomas LocherETH ZurichEmail verificata su tik.ee.ethz.ch