Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dirk GrunwaldUniversity of ColoradoVerified email at colorado.edu
- Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
- Mashael AlSabahQatar Computing Research InstituteVerified email at hbku.edu.qa
- Tadayoshi KohnoProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
- Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
- Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
- Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
- Roger DingledineThe Tor ProjectVerified email at freehaven.net
- William StreileinMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Eric AndersonNortheastern UniversityVerified email at northeastern.edu
- Anders DrachenProfessor, SDU Metaverse Lab, University of Southern DenmarkVerified email at york.ac.uk
- Robert W D VeitchHead of Data, SEEKVerified email at cbs.dk
- Tao WangAssistant Professor, Simon Fraser UniversityVerified email at sfu.ca
- Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
- Janne LindqvistAalto University (Computer Science)Verified email at aalto.fi
- Greg GrudicContext Data AnalyticsVerified email at contextdataanalytics.com
- Caleb PhillipsNational Renewable Energy LaboratoryVerified email at smallwhitecube.com
- Thomas HobsonMIT Lincoln LaboratoryVerified email at ll.mit.edu