Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- John S. BarasProfessor of Ellectrical and Computer Engineering, University of MarylandVerified email at umd.edu
- Reza ShokriNational University of Singapore; MicrosoftVerified email at comp.nus.edu.sg
- Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
- Jean-Yves Le BoudecHonorary professor of communication systems, EPFLVerified email at epfl.ch
- Dr Eirini AnthiCybersecurity Lecturer, Cardiff UniversityVerified email at cardiff.ac.uk
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
- Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
- Carmela TroncosoEPFLVerified email at epfl.ch
- Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
- Ehsan KazemiGoogleVerified email at google.com
- George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
- Ioannis StavrakakisProfessor of Computer Science / Telecommunications, National and Kapodistrian University of AthensVerified email at di.uoa.gr
- Mahesh K. MarinaSchool of Informatics, The University of EdinburghVerified email at inf.ed.ac.uk
- Svetlana RadosavacInstitutional Shareholder ServicesVerified email at issgovernance.com
- Hugh LeatherUniversity of EdinburghVerified email at inf.ed.ac.uk
- Thanasis PapaioannouAssistant Professor, NKUA, Greece & Senior Researcher, AUEB, GreeceVerified email at aueb.gr
- Spyros LalisProfessor of Computer Science, University of ThessalyVerified email at inf.uth.gr
- Grigorios Loukides, PhDKing's College LondonVerified email at kcl.ac.uk