Get my own profile
Public access
View all18 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- alessandra russoProfessor in Applied Computational LogicVerified email at imperial.ac.uk
- Qun NiSoftware Engineer, Google IncVerified email at google.com
- Arcot RajasekarProfessor of Information Science, University of North Carolina at Chapel HillVerified email at unc.edu
- Dan (Linda) LinProfessor of Computer Science, Director of I-Privacy Lab, Vanderbilt UniversityVerified email at vanderbilt.edu
- Ian MolloyIBM ResearchVerified email at us.ibm.com
- Jiefei MaResearch Associate in Computing, Imperial College LondonVerified email at imperial.ac.uk
- Emil LupuProfessor of Computer SystemsVerified email at imperial.ac.uk
- Chitta BaralProfessor of Computer Science, Arizona State UniversityVerified email at asu.edu
- Morris SlomanDepartment of Computing, Imperial College LondonVerified email at imperial.ac.uk
- Randeep BhatiaBell Labs, NokiaVerified email at research.bell-labs.com
- Kang-Won LeeChief Digital Officer, SK On, SK Telecom, IBM ResearchVerified email at sk.com
- Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
- Dinesh VermaIBMVerified email at us.ibm.com
- Windhya RankothgeResearch Associate (Faculty), Canadian Institute for Cybersecurity, University of New BrunswickVerified email at unb.ca
- Jan ChomickiProfessor of Computer Science and Engineering, SUNY at BuffaloVerified email at buffalo.edu
- Alberto TrombettaAssociate Professor of Computer Science, University of InsubriaVerified email at uninsubria.it
- Goce TrajcevskiDept. of ECpE, Iowa State UniversityVerified email at iastate.edu
- Prof. Arosha K. BandaraProfessor of Software Engineering, The Open UniversityVerified email at open.ac.uk
- Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu