Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Carlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
- Adam DoupéAssociate Professor, Arizona State UniversityVerified email at asu.edu
- Gail-Joon AhnArizona State UniversityVerified email at asu.edu
- Ruoyu "Fish" WangArizona State UniversityVerified email at asu.edu
- Tiffany BaoArizona State UniversityVerified email at asu.edu
- Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
- Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
- Ali AbbasiFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Juan Camilo Lozano CarrilloPhD Candidate; University of California, Santa CruzVerified email at ucsc.edu
- Luis Eduardo Salazar BadelUniversity of California, Santa CruzVerified email at ucsc.edu
- Jacob HopkinsTexas A&M University - Corpus ChristiVerified email at islander.tamucc.edu
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Bhupendra AcharyaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Lea SchönherrCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Adam OestAmazonVerified email at asu.edu
- Antonio Emanuele CinàAssistant Professor @ University of GenoaVerified email at unige.it
- Muhammad SaadX (formerly Twitter)Verified email at knights.ucf.edu