Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
Gábor PékBudapest University of Technology and EconomicsVerified email at crysys.hu
Christian KreibichAn engineer at CorelightVerified email at icir.org
Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Chris KanichUniversity of Illinois at ChicagoVerified email at uic.edu
Julien FreudigerGoogleVerified email at frdgr.ch
He LiuUniversity of California, San DiegoVerified email at cs.ucsd.edu
Janos SzurdiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Jean WalrandProfessor of EECSVerified email at eecs.berkeley.edu
Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Chris GrierUniversity of California, BerkeleyVerified email at imchris.org
Neha ChachraResearch Scientist, FacebookVerified email at fb.com
Tamás HolczerAsistant Professor, BMEVerified email at crysys.hu
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Gábor HorváthBudapest University of Technology and Economics, Dept. of Networked Systems and ServicesVerified email at hit.bme.hu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at