Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Martín OchoaZurich University of Applied SciencesEmail verificata su zhaw.ch
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Ivan HomoliakAssistant Professor, Brno University of TechnologyEmail verificata su fit.vutbr.cz
- Flavio ToffaliniEPFL, HexHive LaboratoryEmail verificata su epfl.ch
- Juan David Guarnizo HernandezPostDoc at ETHZEmail verificata su inf.ethz.ch
- Daniele AntonioliEURECOMEmail verificata su eurecom.fr
- David K Y YauSingapore University of Technology and DesignEmail verificata su sutd.edu.sg
- Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzEmail verificata su ucsc.edu
- Zhongyuan HauPhD Student, Imperial College LondonEmail verificata su imperial.ac.uk
- Sandra Julieta RuedaUniversidad de Los Andes, ColombiaEmail verificata su uniandes.edu.co
- Soumik MondalAgency for Science, Technology and Research (A*STAR)Email verificata su i2r.a-star.edu.sg
Segui
John H. Castellanos
Cybersecurity researcher, Hitachi Energy Research
Email verificata su hitachienergy.com