Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Asaf ShabtaiSoftware and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion UniversityVerified email at bgu.ac.il
Yuval EloviciHead of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion UniversityVerified email at bgu.ac.il
Michael BohadanaVerified email at post.bgu.ac.il
Yael MathovPh.D. Student, Ben Gurion UniversityVerified email at post.bgu.ac.il
Juan David Guarnizo HernandezPostDoc at ZHAWVerified email at zhaw.ch
Yisroel MirskyBen-Gurion UniversityVerified email at bgu.ac.il
Dominik BreitenbacherMalware Researcher, ESETVerified email at eset.com
Vinay SachidanandaPrincipal ScientistVerified email at ntu.edu.sg
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Martín OchoaUniversidad de Los AndesVerified email at uniandes.edu.co
Gad RabinowitzProfessor of Industrial Engineering, Ben-Gurion University of the NegevVerified email at bgu.ac.il
Michael HassounAriel UniversityVerified email at ariel.ac.il
Boaz LernerProfessor of Machine Learning, Ben-Gurion UniversityVerified email at bgu.ac.il
Suhas BhairavTIBVerified email at tib.eu
Shachar SiboniBen-Gurion University of the NegevVerified email at post.bgu.ac.il
Ben NassiCornell TechVerified email at post.bgu.ac.il
Ron BittonDepartment of software and information system engineering @ Ben Gurion universityVerified email at post.bgu.ac.il
Dudu MimranVerified email at dudumimran.com