Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ivan De Oliveira NunesUniversity of ZurichVerified email at ifi.uzh.ch
Karim EldefrawyPrincipal Computer Scientist, SRI InternationalVerified email at sri.com
Xavier CarpentUniversity of NottinghamVerified email at nottingham.ac.uk
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Adam Ilyas CaulfieldUniversity of WaterlooVerified email at uwaterloo.ca
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Thomas NymanL M EricssonVerified email at ericsson.com
Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
Ahmad IbrahimCISPAVerified email at cispa.de
Jakapan SuabootAssistant Professor of Information Technology, Prince of Songkla UniversityVerified email at psu.ac.th
Kuljaree TantayakulCollege of Computing, Prince of Songkla UniversityVerified email at phuket.psu.ac.th
Sinchai KamolphiwongPrince of Songkla UniversityVerified email at coe.psu.ac.th
Hideya OchiaiThe University of TokyoVerified email at g.ecc.u-tokyo.ac.jp
Warodom WerapunPrince of Songkla University, Phuket CampusVerified email at phuket.psu.ac.th
Dr. Hassen SaidiSr Computer Scientist, SRI InternationalVerified email at csl.sri.com
Donlapark PonnopratChiang Mai UniversityVerified email at cmu.ac.th
Dr. Nasrin SohrabiLecturer (Assistant Professor)Verified email at deakin.edu.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au