Get my own profile
Public access
View all26 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Samir TataTélécom SudParis, Institut Mines-Télécom, FranceVerified email at it-sudparis.eu
- Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
- Nagapramod MandagereCohesityVerified email at cohesity.com
- Vasily TarasovSenior Research Scientist, IBM ResearchVerified email at us.ibm.com
- Dean HildebrandGoogleVerified email at google.com
- Dimitris SkourtisVectorizedVerified email at soe.ucsc.edu
- Sami YanguiLAAS-CNRSVerified email at laas.fr
- Ali AnwarAssistant Professor, University of MinnesotaVerified email at umn.edu
- Obinna AnyaGoogleVerified email at google.com
- Ali R. ButtProfessor of Computer Science, Virginia TechVerified email at cs.vt.edu
- Mohamed SellamiInstitut Polytechnique de Paris, Institut Mines-Telecom, Telecom SudParisVerified email at telecom-sudparis.eu
- Ling LiuGeorgia Institute of TechnologyVerified email at cc.gatech.edu
- Yue ChengThe University of Hong KongVerified email at hku.hk
- Nesrine KaanicheInstitut Polytechnique de ParisVerified email at telecom-sudparis.eu
- Emre YigitogluGeorgia Institute of TechnologyVerified email at gatech.edu
- Mourad AmzianiPh.D., Cloud Project Director at Direction interministérielle du Numérique (DINUM)Verified email at modernisation.gouv.fr
- Tarek MellitiAssociate Professor at University of Evry, FranceVerified email at ibisc.fr
- Sana BelguithSenior Lecturer in Cyber Security, University of Bristol UKVerified email at bristol.ac.uk
- Ming ZhaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
- Raju RangaswamiFlorida International UniversityVerified email at cs.fiu.edu