Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Martín OchoaZurich University of Applied SciencesEmail verificata su zhaw.ch
- Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityEmail verificata su bgu.ac.il
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityEmail verificata su bgu.ac.il
- Yair MeidanExperienced Data Scientist / Applied Machine Learning ResearcherEmail verificata su post.bgu.ac.il
- Michael BohadanaEmail verificata su post.bgu.ac.il
- Ivan HomoliakAssistant Professor, Brno University of TechnologyEmail verificata su fit.vutbr.cz
- Flavio ToffaliniEPFL, HexHive LaboratoryEmail verificata su epfl.ch
- John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchEmail verificata su hitachienergy.com
- Amit TambeResearcher, F-SecureEmail verificata su f-secure.com
- Paweł SzałachowskiEmail verificata su google.com
- Alexander BinderChair Computer Vision, OvGU, Magdeburg, GermanyEmail verificata su ovgu.de
- Yi Xiang Marcus TanSingapore University of Technology and DesignEmail verificata su mymail.sutd.edu.sg
- Penny ChongIBM Research, SingaporeEmail verificata su ibm.com
- Bithin AlangotHuawei Munich Research CenterEmail verificata su huawei.com
- Soumik MondalAgency for Science, Technology and Research (A*STAR)Email verificata su i2r.a-star.edu.sg