Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yossi OrenSenior Lecturer (≝Assistant Professor) at Ben Gurion University's Cyber Security Research CenterVerified email at bgu.ac.il
David PelegProfessor of Computer Science, Weizmann InstituteVerified email at weizmann.ac.il
Yuval ShavittTel Aviv UniversityVerified email at eng.tau.ac.il
Dahlia malkhiNoviVerified email at fb.com
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Mira GonenAriel University ,Senior LecturerVerified email at ariel.ac.il
Liron DavidTel Aviv UniversityVerified email at post.tau.ac.il
Bülent YenerProfessor of Computer Science, Director of Data Science Research Center RPIVerified email at cs.rpi.edu
Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Kobbi NissimDept. of Computer Science (Georgetown)Verified email at georgetown.edu
Amit KleinmannTel-Aviv UniversityVerified email at post.tau.ac.il
Rebecca N. WrightBarnard CollegeVerified email at barnard.edu
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Dalit NaorSchool of Computer Science, Academic College of Tel-Aviv YaffoVerified email at mta.ac.il
Jessica StaddonJP Morgan Chase, AI ResearchVerified email at jpmchase.com
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Arie YeredorProfessor, School of Electrical Engineering, Tel-Aviv UniversityVerified email at eng.tau.ac.il
Hank KorthProfessor of Computer Science, Lehigh UniversityVerified email at lehigh.edu
Todd A. AndersonResearch Scientist, Intel LabsVerified email at intel.com
Follow
Avishai Wool
Professor of Computer Engineering, Tel Aviv University
Verified email at eng.tau.ac.il - Homepage