Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kaihua QinYale UniversityEmail verificata su qin.ac
- Liyi ZhouImperial College LondonEmail verificata su imperial.ac.uk
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Benjamin LivshitsReader (Associate Professor++) in Computer ScienceEmail verificata su imperial.ac.uk
- Stefanos ChaliasosPhD student, Imperial College LondonEmail verificata su imperial.ac.uk
- Dawn SongProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- Jens ErnstbergerTechnical University of MunichEmail verificata su tum.de
- Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteEmail verificata su imdea.org
- Philipp JovanovicUniversity College LondonEmail verificata su jovanovic.io
- Andrei Marian DanHitachi Energy ResearchEmail verificata su hitachienergy.com
- Dana Drachsler-CohenTechnionEmail verificata su ee.technion.ac.il
- Stefanie RoosProfessor, University of Kaiserslautern-LandauEmail verificata su cs.rptu.de
- Joshua David LindFounding Engineer, Aptos LabsEmail verificata su aptoslabs.com
- Panayiotis PanayiotouUniversity of BathEmail verificata su bath.ac.uk
- Roger WattenhoferETH ZurichEmail verificata su ethz.ch
- Sinisa MateticProgram Director, ETH ZurichEmail verificata su inf.ethz.ch
- Aritra DharHuawei Zurich Research CenterEmail verificata su huawei.com
- David M. SommerSystem Security Group, ETH ZürichEmail verificata su inf.ethz.ch
- Vincent LendersCyber-Defence Campus, armasuisseEmail verificata su lenders.ch
- Duc V. LeVisa ResearchEmail verificata su visa.com