Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
- shlomo hershkopUniversity of PennsylvaniaVerified email at shlomohershkop.com
- Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
- Vasileios P. KemerlisAssociate Professor, Brown UniversityVerified email at cs.brown.edu
- Pratap PrabhuColumbia UniversityVerified email at rootshell.in
- Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
- Yingbo SongPeraton LabsVerified email at peratonlabs.com
- Jonathan VorisLunch Actually GroupVerified email at voris.tech
- Christian W ProbstUnitec Institute of TechnologyVerified email at unitec.ac.nz
- Kamrul HasanAssistant Professor of Cybersecurity, Tennessee State University, Nashville, TNVerified email at tnstate.edu
- Sachin ShettyOld Dominion UniversityVerified email at odu.edu
- Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu
- Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
- Ilsun YouKookmin UniversityVerified email at kookmin.ac.kr
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Charles V. WrightAssociate Professor, Portland State UniversityVerified email at pdx.edu
- Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
- Dongwan ShinProfessor of Computer Science and Engineering, New Mexico TechVerified email at nmt.edu