Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Martina ZitterbartEmail verificata su kit.edu
- Guevara NoubirProfessor of Computer Science, Northeastern UniversityEmail verificata su ccs.neu.edu
- Travis MayberryUS Naval AcademyEmail verificata su usna.edu
- Hans-Joachim HofResearch Professor on Automotive Security at Technische Hochschule IngolstadtEmail verificata su thi.de
- Refik MolvaProfessor EURECOMEmail verificata su eurecom.fr
- Roland BlessKarlsruhe Institute of Technology (KIT)Email verificata su kit.edu
- Florian KerschbaumUniversity of WaterlooEmail verificata su uwaterloo.ca
- Kaoutar ElkhiyaouiIBM ResearchEmail verificata su zurich.ibm.com
- Tarik MoatazBrown UniversityEmail verificata su brown.edu
- Anil KurmusIBM Research - ZurichEmail verificata su zurich.ibm.com
- Artur HeckerHuawei TechnologiesEmail verificata su hecker.info
- Houda LabiodTelecom ParisTechEmail verificata su telecom-paristech.fr
- Triet Vo-HuuNortheastern UniversityEmail verificata su ccs.neu.edu
- Aurélien FrancillonProfessor, EURECOMEmail verificata su eurecom.fr
- Davide BalzarottiProfessor, EurecomEmail verificata su eurecom.fr
- Ioannis KoltsidasAxelera AIEmail verificata su google.com
- Kaan OnarliogluAkamai TechnologiesEmail verificata su iseclab.org
- Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTEmail verificata su kaust.edu.sa
- William RobertsonAssociate Professor of Computer Science, Northeastern UniversityEmail verificata su ccs.neu.edu
- Melek ÖnenEURECOMEmail verificata su eurecom.fr