Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Harshad SathayeETH ZurichVerified email at inf.ethz.ch
Domien SchepersNortheastern UniversityVerified email at northeastern.edu
Ramya Jayaram MastiAmpere ComputingVerified email at amperecomputing.com
Mathy VanhoefDistriNet, KU LeuvenVerified email at kuleuven.be
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Pau ClosasAssociate Professor of ECE, Northeastern UniversityVerified email at northeastern.edu
Evangelos BitsikasDoctoral Researcher, Northeastern UniversityVerified email at northeastern.edu
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Mridula SinghCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
Narmeen ShafqatNortheastern UniversityVerified email at northeastern.edu
Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
Lothar ThieleProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
Devendra RaiSwiss Federal Institute, ZurichVerified email at tik.ee.ethz.ch
Patrick LeuETH ZurichVerified email at inf.ethz.ch
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Luka MalisaETH ZurichVerified email at inf.ethz.ch
Gerald LaMountainPhD Candidate, Northeastern UniversityVerified email at northeastern.edu