Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Martín OchoaZurich University of Applied SciencesVerified email at 8ar.ch
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
Juan David Guarnizo HernandezPostDoc at ETHZVerified email at inf.ethz.ch
Daniele AntonioliEURECOMVerified email at eurecom.fr
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
David K Y YauSingapore University of Technology and DesignVerified email at sutd.edu.sg
Zhongyuan HauImperial College LondonVerified email at imperial.ac.uk
Sandra Julieta RuedaUniversidad de Los Andes, ColombiaVerified email at uniandes.edu.co
Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg
Follow![John H. Castellanos](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=eaOMGpIAAAAJ&citpid=1)
John H. Castellanos
Cybersecurity researcher, Hitachi Energy Research
Verified email at hitachienergy.com