Get my own profile
Public access
View all18 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
alessandra russoProfessor in Applied Computational LogicVerified email at imperial.ac.uk
Qun NiSoftware Engineer, Google IncVerified email at google.com
Arcot RajasekarProfessor of Information Science, University of North Carolina at Chapel HillVerified email at unc.edu
Dan (Linda) LinProfessor of Computer Science, Director of I-Privacy Lab, Vanderbilt UniversityVerified email at vanderbilt.edu
Ian MolloyIBM ResearchVerified email at us.ibm.com
Jiefei MaResearch Associate in Computing, Imperial College LondonVerified email at imperial.ac.uk
Emil LupuProfessor of Computer SystemsVerified email at imperial.ac.uk
Chitta BaralProfessor of Computer Science, Arizona State UniversityVerified email at asu.edu
Morris SlomanDepartment of Computing, Imperial College LondonVerified email at imperial.ac.uk
Randeep BhatiaBell Labs, NokiaVerified email at research.bell-labs.com
Kang-Won LeeChief Digital Officer, SK On, SK Telecom, IBM ResearchVerified email at sk.com
Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
Dinesh VermaIBMVerified email at us.ibm.com
Windhya RankothgeResearch Associate (Faculty), Canadian Institute for Cybersecurity, University of New BrunswickVerified email at unb.ca
Jan ChomickiProfessor of Computer Science and Engineering, SUNY at BuffaloVerified email at buffalo.edu
Alberto TrombettaAssociate Professor of Computer Science, University of InsubriaVerified email at uninsubria.it
Goce TrajcevskiDept. of ECpE, Iowa State UniversityVerified email at iastate.edu
Prof. Arosha K. BandaraProfessor of Software Engineering, The Open UniversityVerified email at open.ac.uk
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu