Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityVerified email at bgu.ac.il
- Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
- Michael BohadanaVerified email at post.bgu.ac.il
- Yael MathovPh.D. Student, Ben Gurion UniversityVerified email at post.bgu.ac.il
- Juan David Guarnizo HernandezPostDoc at ZHAWVerified email at zhaw.ch
- Yisroel MirskyBen-Gurion UniversityVerified email at bgu.ac.il
- Dominik BreitenbacherMalware Researcher, ESETVerified email at eset.com
- Vinay SachidanandaPrincipal ScientistVerified email at ntu.edu.sg
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Martín OchoaUniversidad de Los AndesVerified email at uniandes.edu.co
- Gad RabinowitzProfessor of Industrial Engineering, Ben-Gurion University of the NegevVerified email at bgu.ac.il
- Michael HassounAriel UniversityVerified email at ariel.ac.il
- Boaz LernerProfessor of Machine Learning, Ben-Gurion UniversityVerified email at bgu.ac.il
- Suhas BhairavTIBVerified email at tib.eu
- Shachar SiboniBen-Gurion University of the NegevVerified email at post.bgu.ac.il
- Ben NassiCornell TechVerified email at post.bgu.ac.il
- Ron BittonDepartment of software and information system engineering @ Ben Gurion universityVerified email at post.bgu.ac.il