Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Michael Donald BaileyUniversity of IllinoisVerified email at illinois.edu
David AdrianUniversity of MichiganVerified email at umich.edu
Elie BurszteinSecurity and anti-abuse research lead, GoogleVerified email at google.com
Deepak KumarStanford UniversityVerified email at stanford.edu
Zane MaGeorgia Institute of TechnologyVerified email at gatech.edu
Eric WustrowUniversity of Colorado BoulderVerified email at colorado.edu
Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
James KastenUniversity of MichiganVerified email at umich.edu
Ariana MirianUC San DiegoVerified email at eng.ucsd.edu
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Frank LiAssistant Professor, Georgia TechVerified email at gatech.edu
Nicholas SullivanCloudflare Inc.Verified email at cloudflare.com
Manos AntonakakisGeorgia Institute of TechnologyVerified email at gatech.edu
Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
Karthikeyan BhargavanINRIAVerified email at inria.fr
Richard BarnesChief Security Architect for Collaboration, CiscoVerified email at ipv.sx
Damon McCoyAssociate Professor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Liz IzhikevichStanford UniversityVerified email at stanford.edu