Get my own profile
Public access
View all51 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ersin UzunRIT ESL Global Cybersecurity InstituteVerified email at rit.edu
Emiliano De CristofaroProfessor at University College LondonVerified email at ucl.ac.uk
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Paolo GastiAssociate Professor at New York Institute of TechnologyVerified email at nyit.edu
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Roberto Di PietroACM Distinguished Scientist; Full Professor of Cybersecurity, HBKU-College of ScienceVerified email at hbku.edu.qa
Claudio SorienteNEC LabsVerified email at neclab.eu
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, Fraunhofer SITVerified email at sit.tu-darmstadt.de
Cesar GhaliSoftware Engineer, GoogleVerified email at uci.edu
Deborah EstrinProfessor of Computer Science, Cornell Tech, Cornell UniversityVerified email at cornell.edu
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
Norrathep RattanavipanonPrince of Songkla University, Phuket CampusVerified email at phuket.psu.ac.th
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Karim EldefrawyPrincipal Computer Scientist, SRI InternationalVerified email at sri.com
Ralf HauserCTO PrivaSphere AGVerified email at acm.org
Refik MolvaProfessor EURECOMVerified email at eurecom.fr
Jeff BurkeUniversity of California, Los AngelesVerified email at remap.ucla.edu
Maithili NarasimhaVerified email at cisco.com