Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityVerified email at bgu.ac.il
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Michael BohadanaVerified email at post.bgu.ac.il
Juan David Guarnizo HernandezPostDoc at ETHZVerified email at inf.ethz.ch
Yael MathovPh.D. Student, Ben Gurion UniversityVerified email at post.bgu.ac.il
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Martín OchoaZurich University of Applied SciencesVerified email at 8ar.ch
Yisroel MirskyBen-Gurion UniversityVerified email at bgu.ac.il
Dominik BreitenbacherMalware Researcher, ESETVerified email at eset.com
Vinay SachidanandaPrincipal ScientistVerified email at ntu.edu.sg
Gad RabinowitzProfessor of Industrial Engineering, Ben-Gurion University of the NegevVerified email at bgu.ac.il
Michael HassounAriel UniversityVerified email at ariel.ac.il
Boaz LernerProfessor of Machine Learning, Ben-Gurion UniversityVerified email at bgu.ac.il
Suhas BhairavTIBVerified email at tib.eu
Shachar SiboniBen-Gurion University of the NegevVerified email at post.bgu.ac.il
Ben NassiCornell TechVerified email at post.bgu.ac.il
Ron BittonDepartment of software and information system engineering @ Ben Gurion universityVerified email at post.bgu.ac.il