Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Karl WüstFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Ghassan KarameProfessor of Computer Science, Ruhr Universität Bochum (RUB)Verified email at rub.de
Kaihua QinImperial College LondonVerified email at imperial.ac.uk
Liyi ZhouImperial College LondonVerified email at imperial.ac.uk
Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
Pedro Moreno-SanchezAssistant Research ProfessorVerified email at imdea.org
William KnottenbeltProfessor of Applied Quantitative Analysis, Department of Computing, Imperial College LondonVerified email at doc.ic.ac.uk
Vincent Lendersarmasuisse, Cyber-Defence CampusVerified email at lenders.ch
Stefanie RoosAssistant Professor, TU DelftVerified email at tudelft.nl
Andrei Marian DanHitachi Energy ResearchVerified email at hitachienergy.com
Dana Drachsler-CohenTechnionVerified email at ee.technion.ac.il
Joshua David LindResearch Scientist, FacebookVerified email at fb.com
Panayiotis PanayiotouETH ZurichVerified email at student.ethz.ch
Sinisa MateticSenior Researcher, ETH ZurichVerified email at inf.ethz.ch
Aritra DharHuawei Zurich Research CenterVerified email at huawei.com
David M. SommerSystem Security Group, ETH ZürichVerified email at inf.ethz.ch
Vedran CAPKUNHEC ParisVerified email at hec.fr
Marc RoeschlinETH Zürich, University of OxfordVerified email at inf.ethz.ch
Elli AndroulakiIBM ResearchVerified email at zurich.ibm.com