Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Ryan ShahSecurity Consultant, SapphireVerified email at hw.ac.uk
Joseph GardinerUniversity of Bristol; Lancaster UniversityVerified email at lancaster.ac.uk
Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Chi-Yao HongGoogleVerified email at google.com
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Kaspar Rosager LudvigsenAssistant Professor, University of DurhamVerified email at durham.ac.uk
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Pragya AgarwalLoughborough UniversityVerified email at lboro.ac.uk
Angela DalyUniversity of DundeeVerified email at dundee.ac.uk
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Chuadhry Mujeeb AhmedNewcastle UniversityVerified email at newcastle.ac.uk
Dipak GhosalProfessor of Computer Science, University of California, DavisVerified email at ucdavis.edu
Arnab Kumar BiswasResearch Fellow at National University of SingaporeVerified email at nus.edu.sg
Virajith JalapartiMicrosoftVerified email at microsoft.com
Aridaman TripathiVerified email at fb.com
Prof. N. BalakrishnanIndian Institute of ScienceVerified email at serc.iisc.ernet.in
Bharath VenkateshServiceNowVerified email at servicenow.com
Djamila AouadaSenior Research Scientist, Interdisciplinary Centre for Security, Reliability, and Trust (SnTVerified email at uni.lu
Follow
Shishir Nagaraja
Professor of Cybersecurity, University of Newcastle
Verified email at newcastle.ac.uk