Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Martín OchoaZurich University of Applied SciencesVerified email at zhaw.ch
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
- Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
- Juan David Guarnizo HernandezPostDoc at ETHZVerified email at inf.ethz.ch
- Daniele AntonioliEURECOMVerified email at eurecom.fr
- David K Y YauSingapore University of Technology and DesignVerified email at sutd.edu.sg
- Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
- Zhongyuan HauPhD Student, Imperial College LondonVerified email at imperial.ac.uk
- Sandra Julieta RuedaUniversidad de Los Andes, ColombiaVerified email at uniandes.edu.co
- Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg
Follow
John H. Castellanos
Cybersecurity researcher, Hitachi Energy Research
Verified email at hitachienergy.com