Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Alex C. SnoerenUC San DiegoVerified email at cs.ucsd.edu
Damon McCoyAssociate Professor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Kirill LevchenkoUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Elie BurszteinSecurity and anti-abuse research lead, GoogleVerified email at google.com
Noah ApthorpeAssistant Professor of Computer Science, Colgate UniversityVerified email at colgate.edu
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
Chris GrierUniversity of California, BerkeleyVerified email at imchris.org
Gunes AcarAssistant Professor at Radboud UniversityVerified email at cs.ru.nl
Nicholas WeaverInternational Computer Science InstituteVerified email at berkeley.edu
Frank LiAssistant Professor, Georgia TechVerified email at gatech.edu
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
Hitesh DharmdasaniInformant NetworksVerified email at informantnetworks.com
Vacha DaveMicrosoft CorporationVerified email at microsoft.com
Sarah MeiklejohnProfessor at University College LondonVerified email at ucl.ac.uk
Luca InvernizziStaff Research Scientist @ Google (CH)Verified email at google.com
Max AliapouliosNew York UniversityVerified email at nyu.edu
Vector Guo LiGoogleVerified email at google.com
Dillon ReismanVerified email at nyu.edu