Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
Samir TataTélécom SudParis, Institut Mines-Télécom, FranceVerified email at it-sudparis.eu
Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
Nagapramod MandagereCohesityVerified email at cohesity.com
Lukas RupprechtResearch Staff Member, IBM Research AlmadenVerified email at ibm.com
Vasily TarasovResearch Staff Member, Manager, IBM ResearchVerified email at us.ibm.com
Dean HildebrandGoogleVerified email at google.com
Sami YanguiLAAS-CNRSVerified email at laas.fr
Dimitris SkourtisVectorizedVerified email at soe.ucsc.edu
Obinna AnyaGoogleVerified email at google.com
Ali AnwarAssistant Professor, University of MinnesotaVerified email at umn.edu
Ali R. ButtProfessor of Computer Science, Virginia TechVerified email at cs.vt.edu
Mohamed SellamiInstitut Polytechnique de Paris, Institut Mines-Telecom, Telecom SudParisVerified email at telecom-sudparis.eu
Ling LiuGeorgia Institute of TechnologyVerified email at cc.gatech.edu
Nesrine KaanicheInstitut Polytechnique de ParisVerified email at telecom-sudparis.eu
Yue ChengThe University of Hong KongVerified email at hku.hk
Emre YigitogluGeorgia Institute of TechnologyVerified email at gatech.edu
Mourad AmzianiPh.D., Cloud Project Director at Direction interministérielle du Numérique (DINUM)Verified email at modernisation.gouv.fr
Tarek MellitiAssociate Professor at University of Evry, FranceVerified email at ibisc.fr
Sana BelguithLecturer in Cyber Security and Applied Cryptography, University of Bristol UKVerified email at bristol.ac.uk
Ming ZhaoAssociate Professor, Arizona State UniversityVerified email at asu.edu