Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ivan De Oliveira NunesUniversity of ZurichVerified email at ifi.uzh.ch
Karim EldefrawyPrincipal Computer Scientist, SRI InternationalVerified email at sri.com
Xavier CarpentUniversity of NottinghamVerified email at nottingham.ac.uk
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Thomas NymanL M EricssonVerified email at ericsson.com
Adam Ilyas CaulfieldRochester Institute of TechnologyVerified email at rit.edu
Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
Ahmad IbrahimCISPAVerified email at cispa.de
Jakapan SuabootPrince of Songkla UniversityVerified email at phuket.psu.ac.th
Kuljaree TantayakulCollege of Computing, Prince of Songkla UniversityVerified email at phuket.psu.ac.th
Sinchai KamolphiwongPrince of Songkla UniversityVerified email at coe.psu.ac.th
Hideya OchiaiThe University of TokyoVerified email at g.ecc.u-tokyo.ac.jp
Dr. Hassen SaidiSr Computer Scientist, SRI InternationalVerified email at csl.sri.com
Warodom WerapunPrince of Songkla University, Phuket CampusVerified email at phuket.psu.ac.th
Donlapark PonnopratChiang Mai UniversityVerified email at cmu.ac.th
Dr. Nasrin SohrabiLecturer (Assistant Professor)Verified email at deakin.edu.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au