Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaEmail verificata su illinois.edu
- Ryan ShahSecurity Consultant, SapphireEmail verificata su hw.ac.uk
- Joseph GardinerUniversity of Bristol; Lancaster UniversityEmail verificata su lancaster.ac.uk
- Matthew CaesarProfessor of Computer Science, University of IllinoisEmail verificata su illinois.edu
- Chi-Yao HongGoogleEmail verificata su google.com
- Prateek MittalProfessor, Princeton UniversityEmail verificata su princeton.edu
- Kaspar Rosager LudvigsenAssistant Professor, University of DurhamEmail verificata su durham.ac.uk
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Amir HoumansadrUniversity of Massachusetts AmherstEmail verificata su cs.umass.edu
- Pragya AgarwalLoughborough UniversityEmail verificata su lboro.ac.uk
- Angela DalyUniversity of DundeeEmail verificata su dundee.ac.uk
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Chuadhry Mujeeb AhmedNewcastle UniversityEmail verificata su newcastle.ac.uk
- Dipak GhosalProfessor of Computer Science, University of California, DavisEmail verificata su ucdavis.edu
- Arnab Kumar BiswasResearch Fellow at National University of SingaporeEmail verificata su nus.edu.sg
- Virajith JalapartiMicrosoftEmail verificata su microsoft.com
- Aridaman TripathiEmail verificata su fb.com
- Prof. N. BalakrishnanIndian Institute of ScienceEmail verificata su serc.iisc.ernet.in
- Bharath VenkateshServiceNowEmail verificata su servicenow.com
- Djamila AouadaSenior Research Scientist, Interdisciplinary Centre for Security, Reliability, and Trust (SnTEmail verificata su uni.lu
Segui
Shishir Nagaraja
Professor of Cybersecurity, University of Newcastle
Email verificata su newcastle.ac.uk