Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Roberto PerdisciProfessor of Computer Science, University of GeorgiaEmail verificata su cs.uga.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechEmail verificata su cc.gatech.edu
Chaz LeverGeorgia Institute of TechnologyEmail verificata su gatech.edu
Yacin NadjiCorelight, IncEmail verificata su gatech.edu
Zane MaOregon State UniversityEmail verificata su oregonstate.edu
Michael Donald BaileyGeorgia Institute of TechnologyEmail verificata su gatech.edu
Zakir DurumericStanford UniversityEmail verificata su cs.stanford.edu
Yizheng ChenUniversity of MarylandEmail verificata su umd.edu
Mustaque AhamadGeorgia Institute of TechnologyEmail verificata su cc.gatech.edu
Athanasios KountourasPhD student, Georgia Institute of technologyEmail verificata su gatech.edu
Babak RahbariniaAssistant Professor at Auburn University MontgomeryEmail verificata su aum.edu
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoEmail verificata su uchicago.edu
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringEmail verificata su umich.edu
Luca InvernizziStaff Research Scientist @ Google (CH)Email verificata su google.com
Elie BurszteinGoogle & DeepMind AI Cybersecurity technical and research leadEmail verificata su google.com
Kurt ThomasResearch Scientist @ GoogleEmail verificata su google.com
Rosa Romero GomezSenior Data Visualization Engineer at GraphicacyEmail verificata su graphicacy.com
Nick NikiforakisAssociate Professor, Stony Brook UniversityEmail verificata su cs.stonybrook.edu
Xiapu LuoThe Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityEmail verificata su napier.ac.uk