Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dali KaafarProfessor, Executive Director, Research Group Director Faculty of Science and Engineering MacquarieVerified email at mq.edu.au
William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
Claude CastellucciaResearch Director, InriaVerified email at inria.fr
Emiliano De CristofaroProfessor at University of California, RiversideVerified email at ucr.edu
Daniele PeritoUniversity of California, BerkeleyVerified email at eecs.berkeley.edu
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Kaan OnarliogluAkamai TechnologiesVerified email at iseclab.org
Christo WilsonAssociate Professor, Northeastern UniversityVerified email at ccs.neu.edu
Jiefeng (Terence) ChenData Scientist - TelstraVerified email at nicta.com.au
Gergely AcsResearch Engineer, INRIAVerified email at inria.fr
Arnaud LegoutResearch scientist Inria, FranceVerified email at inria.fr
Walid DabbousINRIAVerified email at inria.fr
Arik FriedmanData Scientist, AtlassianVerified email at atlassian.com
Mathieu CuncheAssociate Prof. INSA Lyon, Inria, FranceVerified email at insa-lyon.fr
Roksana BoreliPrincipal Consultant at TMPP Pty. Ltd.Verified email at tmppbiz.com
Sajjad "JJ" ArshadGooglerVerified email at iseclab.org
Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyVerified email at rit.edu
Ratan DeyIndustry Associate Professor, NYU Tandon School of EngineeringVerified email at nyu.edu
Keith RossLeonard J. Shustek Professor of Computer Science, Dept. of Computer Science and Engineering, NYUVerified email at nyu.edu