Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
didier sornetteSUSTech, ShenzhenVerified email at ethz.ch
John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
Alain MermoudCyber-Defence Campus, armasuisse Science and Technology, SwitzerlandVerified email at ethz.ch
Dimitri Percia DavidProfessor, University of Applied Sciences of Western SwitzerlandVerified email at hevs.ch
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Marie SchaerFaculty of Medicine, Geneva University, SwitzerlandVerified email at unige.ch
Mingyi ZhaoNotionVerified email at makenotion.com
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Nada KojovicUniversity of GenevaVerified email at unige.ch
Russell Cameron ThomasPhD student, Department of Computational and Data Sciences, George Mason UniversityVerified email at gmu.edu
Joan SchmitProfessor of Risk Management and Insurance, University of Wisconsin-MadisonVerified email at bus.wisc.edu
Shaun WangSouthern University of Science and Technology, ChinaVerified email at risklighthouse.com
Gregory FalcoCornell University, MIT CSAIL, HarvardVerified email at mit.edu
Lawrence A. GordonUniversity of Maryland, Smith School of BusinessVerified email at umd.edu
Spencer WheatleySenior Scientist, ETH ZürichVerified email at ethz.ch
Shreyasvi NatrajETH ZürichVerified email at ethz.ch
Sharada Prasanna MohantyAIcrowd SA, SwitzerlandVerified email at epfl.ch
Georg von KroghProfessor, ETH ZurichVerified email at ethz.ch
Sebastian SpaethUniversity of HamburgVerified email at uni-hamburg.de
Martin BurkhartCyber-Defence Campus, SwitzerlandVerified email at ar.admin.ch