Get my own profile
Public access
View all57 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyVerified email at rit.edu
Emiliano De CristofaroProfessor at University of California, RiversideVerified email at ucr.edu
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Paolo GastiAssociate Professor at New York Institute of TechnologyVerified email at nyit.edu
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
Claudio SorienteNEC LabsVerified email at neclab.eu
Cesar GhaliSoftware Engineer, GoogleVerified email at uci.edu
Norrathep RattanavipanonPrince of Songkla UniversityVerified email at phuket.psu.ac.th
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, ATHENE and Fraunhofer SITVerified email at sit.fraunhofer.de
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
Deborah EstrinProfessor of Computer Science, Cornell Tech, Cornell UniversityVerified email at cornell.edu
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Karim EldefrawyPrincipal Computer Scientist, SRI InternationalVerified email at sri.com
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Refik MolvaProfessor EURECOMVerified email at eurecom.fr
Ivan De Oliveira NunesRochester Institute of TechnologyVerified email at mail.rit.edu
Maithili NarasimhaVerified email at cisco.com
Jeff BurkeUniversity of California, Los AngelesVerified email at remap.ucla.edu