Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Martín OchoaUniversidad de Los AndesVerified email at uniandes.edu.co
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Yair MeidanExperienced Data Scientist / Applied Machine Learning ResearcherVerified email at post.bgu.ac.il
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityVerified email at bgu.ac.il
Michael BohadanaVerified email at post.bgu.ac.il
Ivan HomoliakAssociate Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
Flavio ToffaliniRUB, Assistant ProfessorVerified email at rub.de
John H. CastellanosCybersecurity researcher, Hitachi Energy ResearchVerified email at hitachienergy.com
Amit TambeResearcher, F-SecureVerified email at f-secure.com
Paweł SzałachowskiVerified email at google.com
Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg
Alexander BinderChair Computer Vision, OvGU, Magdeburg, GermanyVerified email at ovgu.de
Yi Xiang Marcus TanSingapore University of Technology and DesignVerified email at mymail.sutd.edu.sg
Penny ChongSAP Labs | Ex-IBM ResearchVerified email at sap.com
Bithin AlangotHuawei Munich Research CenterVerified email at huawei.com