Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
- didier sornetteSUSTech, ShenzhenVerified email at ethz.ch
- John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
- Alain MermoudCyber-Defence Campus, armasuisse Science and Technology, SwitzerlandVerified email at ethz.ch
- Dimitri Percia DavidProfessor, University of Applied Sciences of Western SwitzerlandVerified email at hevs.ch
- Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
- Marie SchaerFaculty of Medicine, Geneva University, SwitzerlandVerified email at unige.ch
- Mingyi ZhaoNotionVerified email at makenotion.com
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Nada KojovicUniversity of GenevaVerified email at unige.ch
- Russell Cameron ThomasPhD student, Department of Computational and Data Sciences, George Mason UniversityVerified email at gmu.edu
- Joan SchmitProfessor of Risk Management and Insurance, University of Wisconsin-MadisonVerified email at bus.wisc.edu
- Shaun WangSouthern University of Science and Technology, ChinaVerified email at risklighthouse.com
- Gregory FalcoCornell University, MIT CSAIL, HarvardVerified email at mit.edu
- Lawrence A. GordonUniversity of Maryland, Smith School of BusinessVerified email at umd.edu
- Spencer WheatleySenior Scientist, ETH ZürichVerified email at ethz.ch
- Georg von KroghProfessor, ETH ZurichVerified email at ethz.ch
- Sebastian SpaethUniversity of HamburgVerified email at uni-hamburg.de
- Shreyasvi NatrajUniversity of GenevaVerified email at unige.ch
- Sharada Prasanna MohantyAIcrowd SA, SwitzerlandVerified email at epfl.ch
- Martin BurkhartCyber-Defence Campus, SwitzerlandVerified email at ar.admin.ch