Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Harshad SathayeETH ZurichVerified email at inf.ethz.ch
Domien SchepersNortheastern UniversityVerified email at northeastern.edu
Ramya Jayaram MastiAmpere ComputingVerified email at amperecomputing.com
Mathy Vanhoefimec-DistriNet, KU LeuvenVerified email at nyu.edu
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Mridula SinghCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Patrick LeuETH ZurichVerified email at inf.ethz.ch
Lothar ThieleProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
Devendra RaiSwiss Federal Institute, ZurichVerified email at tik.ee.ethz.ch
Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Luka MalisaETH ZurichVerified email at inf.ethz.ch
Pau ClosasAssociate Professor of ECE, Northeastern UniversityVerified email at northeastern.edu
Thomas LocherETH ZurichVerified email at tik.ee.ethz.ch
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Sashank NarainAssistant Professor, University of Massachusetts LowellVerified email at uml.edu
Fabio RicciatoEuropean Commission, EurostatVerified email at ec.europa.eu