Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
shlomo hershkopUniversity of PennsylvaniaVerified email at shlomohershkop.com
Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
Vasileios P. KemerlisAssistant Professor, Brown UniversityVerified email at cs.brown.edu
Pratap PrabhuColumbia UniversityVerified email at rootshell.in
Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
Yingbo SongPeraton LabsVerified email at peratonlabs.com
Jonathan VorisLunch Actually GroupVerified email at voris.tech
Christian W ProbstUnitec Institute of TechnologyVerified email at unitec.ac.nz
Kamrul Hasan, Ph.D.Assistant Professor of Cybersecurity, Tennessee State University, Nashville, TNVerified email at tnstate.edu
Sachin ShettyOld Dominion UniversityVerified email at odu.edu
Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu
Ilsun YouKookmin UniversityVerified email at kookmin.ac.kr
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Charles V. WrightAssociate Professor, Portland State UniversityVerified email at pdx.edu
Herbert BosProfessor of Computer Science, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
Dongwan ShinProfessor of Computer Science and Engineering, New Mexico TechVerified email at nmt.edu