Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Qiben YanComputer Science and Engineering, Michigan State UniversityVerified email at msu.edu
- Hamid BagheriUniversity of Nebraska-LincolnVerified email at mit.edu
- Clay StevensUniversity of Nebraska-LincolnVerified email at huskers.unl.edu
- Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Sahel AlounehProfessor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)Verified email at aau.ac.ae
- Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Witawas Srisa-anProfessor, School of Computing, University of Nebraska-LincolnVerified email at unl.edu
- Thomas RepsJ. Barkley Rosser Professor & Rajiv and Ritu Batra Chair, Comp. Sci. Dept., Univ. of WisconsinVerified email at cs.wisc.edu
- Earlence FernandesAssistant Professor, UC San DiegoVerified email at ucsd.edu
- Andrei SabelfeldChalmers University of TechnologyVerified email at chalmers.se
- Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonVerified email at cs.wisc.edu
- Vaibhav RastogiGoogleVerified email at wisc.edu
- Arshad JhumkaUniversity of LeedsVerified email at leeds.ac.uk
- Ahmed Ali-Eldin HassanAssociate Prof. Chalmers University of TechnologyVerified email at chalmers.se
- David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdVerified email at kent.ac.uk