Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Rafael DowsleyMonash UniversityVerified email at monash.edu
- Martine De CockProfessor, University of Washington TacomaVerified email at uw.edu
- Jörn Müller-QuadeProfessor für Informatik, Karlsruhe Institute of TechnologyVerified email at kit.edu
- Bin YuAdobeVerified email at adobe.com
- Akira OtsukaGraduate School of Information Security, Institute of Information Security (IISEC)Verified email at iisec.ac.jp
- Andreas WinterICREA & Universitat Autňnoma de BarcelonaVerified email at uab.cat
- Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
- Jeroen van de GraafProfessor de Cięncia da Computaçăo, Universidade Federal de Minas GeraisVerified email at dcc.ufmg.br
- Kirill MorozovUniversity of North Texas, USAVerified email at unt.edu
- Davis RailsbackUniversity of WashingtonVerified email at uw.edu
- Mayana PereiraMicrosoftVerified email at microsoft.com
- Sikha PentyalaUniversity of Washington TacomaVerified email at uw.edu
- Rajendra KattiUniversity of Washington TacomaVerified email at uw.edu
- Jonathan PeckGhent UniversityVerified email at ugent.be
- Femi OlumofinGoogleVerified email at google.com
- Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
- Chhaya ChoudharyInfobloxVerified email at infoblox.com
- Jiaming HuApple IncVerified email at apple.com
- Jianwei ShenPhD student, University of ArizonaVerified email at email.arizona.edu
- Rafael Timóteo de Sousa JúniorNetwork Engineering Professor, University of Brasilia (UnB)Verified email at unb.br