Get my own profile
Public access
View all1 article
2 articles
available
not available
Based on funding mandates
Co-authors
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
Gábor PékBudapest University of Technology and EconomicsVerified email at crysys.huChristian KreibichAn engineer at CorelightVerified email at icir.org
Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Chris KanichUniversity of Illinois at ChicagoVerified email at uic.edu
Julien FreudigerGoogleVerified email at frdgr.chHe LiuUniversity of California, San DiegoVerified email at cs.ucsd.edu
Jean WalrandProfessor of EECSVerified email at eecs.berkeley.edu
Janos SzurdiCarnegie Mellon UniversityVerified email at andrew.cmu.eduStefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Chris GrierUniversity of California, BerkeleyVerified email at imchris.org
Neha ChachraResearch Scientist, FacebookVerified email at fb.com
Tamás HolczerAssociate Professor, BMEVerified email at crysys.hu
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Gábor HorváthBudapest University of Technology and Economics, Dept. of Networked Systems and ServicesVerified email at hit.bme.hu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at