Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Harshad SathayeETH ZurichVerified email at inf.ethz.ch
Domien SchepersNortheastern UniversityVerified email at northeastern.edu
Ramya Jayaram MastiAmpere ComputingVerified email at amperecomputing.com
Mathy VanhoefDistriNet, KU LeuvenVerified email at kuleuven.be
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Pau ClosasAssociate Professor of ECE, Northeastern UniversityVerified email at northeastern.edu
Mridula SinghCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
Lothar ThieleProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
Devendra RaiSwiss Federal Institute, ZurichVerified email at tik.ee.ethz.ch
Patrick LeuETH ZurichVerified email at inf.ethz.ch
Narmeen ShafqatNortheastern UniversityVerified email at northeastern.edu
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Luka MalisaETH ZurichVerified email at inf.ethz.ch
Evangelos BitsikasPhD Student, Northeastern UniversityVerified email at northeastern.edu
Gerald LaMountainPhD Candidate, Northeastern UniversityVerified email at northeastern.edu
Sashank NarainAssistant Professor, University of Massachusetts LowellVerified email at uml.edu