Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
- Alex C. SnoerenUC San DiegoVerified email at cs.ucsd.edu
- Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
- Kirill LevchenkoUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Noah ApthorpeAssistant Professor of Computer Science, Colgate UniversityVerified email at colgate.edu
- Gunes AcarRadboud UniversityVerified email at cs.ru.nl
- Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
- Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
- Chris GrierUniversity of California, BerkeleyVerified email at imchris.org
- Nicholas WeaverInternational Computer Science InstituteVerified email at berkeley.edu
- Elie BurszteinGoogle & DeepMind AI Cybersecurity technical and research leadVerified email at google.com
- Frank LiAssistant Professor, Georgia TechVerified email at gatech.edu
- Hitesh DharmdasaniInformant NetworksVerified email at informantnetworks.com
- Vacha DaveMicrosoft CorporationVerified email at microsoft.com
- Sarah MeiklejohnProfessor at University College LondonVerified email at ucl.ac.uk
- Luca InvernizziStaff Research Scientist @ Google (CH)Verified email at google.com
- Dillon ReismanVerified email at nyu.edu
- Marshini ChettyUniversity of ChicagoVerified email at uchicago.edu
- Thomas J. HoltSchool of Criminal Justice, Michigan State UniversityVerified email at msu.edu
- Christopher KruegelUniversity of California, Santa Barbara and VMware, Inc.Verified email at cs.ucsb.edu