Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rafael DowsleyMonash UniversityVerified email at monash.edu
Martine De CockProfessor, University of Washington TacomaVerified email at uw.edu
Jörn Müller-QuadeProfessor für Informatik, Karlsruhe Institute of TechnologyVerified email at kit.edu
Bin YuAdobeVerified email at adobe.com
Andreas WinterICREA & Universitat Autňnoma de BarcelonaVerified email at uab.cat
Akira OtsukaGraduate School of Information Security, Institute of Information Security (IISEC)Verified email at iisec.ac.jp
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Jeroen van de GraafProfessor de Cięncia da Computaçăo, Universidade Federal de Minas GeraisVerified email at dcc.ufmg.br
Kirill MorozovUniversity of North Texas, USAVerified email at unt.edu
Davis RailsbackUniversity of WashingtonVerified email at uw.edu
Mayana PereiraMicrosoftVerified email at microsoft.com
Rajendra KattiUniversity of Washington TacomaVerified email at uw.edu
Jonathan PeckGhent UniversityVerified email at ugent.be
Femi OlumofinGoogleVerified email at google.com
Chhaya ChoudharyInfobloxVerified email at infoblox.com
Rafael Timóteo de Sousa JúniorNetwork Engineering Professor, University of Brasilia (UnB)Verified email at unb.br
Jiaming HuMachine Learning Engineer AppleVerified email at apple.com
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Jianwei ShenPhD student, University of ArizonaVerified email at email.arizona.edu
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de