Get my own profile
Public access
View all17 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
alessandra russoProfessor in Applied Computational LogicVerified email at imperial.ac.uk
Emil LupuProfessor of Computer SystemsVerified email at imperial.ac.uk
Jiefei MaResearch Associate in Computing, Imperial College LondonVerified email at imperial.ac.uk
Arcot RajasekarProfessor of Information Science, University of North Carolina at Chapel HillVerified email at unc.edu
Qun NiSoftware Engineer, Google IncVerified email at google.com
Ian MolloyIBM ResearchVerified email at us.ibm.com
Dan (Linda) LinProfessor of Computer Science, Director of I-Privacy Lab, Vanderbilt UniversityVerified email at vanderbilt.edu
Chitta BaralProfessor of Computer Science, Arizona State UniversityVerified email at asu.edu
Morris SlomanDepartment of Computing, Imperial College LondonVerified email at imperial.ac.uk
Randeep BhatiaBell Labs, NokiaVerified email at research.bell-labs.com
Kang-Won LeeChief Digital Officer, SK On, SK Telecom, IBM ResearchVerified email at sk.com
Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
Windhya RankothgeResearch Associate (Faculty), Canadian Institute for Cybersecurity, University of New BrunswickVerified email at unb.ca
Dinesh VermaIBMVerified email at us.ibm.com
Jan ChomickiProfessor of Computer Science and Engineering, SUNY at BuffaloVerified email at buffalo.edu
Goce TrajcevskiDept. of ECpE, Iowa State UniversityVerified email at iastate.edu
Prof. Arosha K. BandaraProfessor of Software Engineering, The Open UniversityVerified email at open.ac.uk
Alberto TrombettaAssociate Professor of Computer Science, University of InsubriaVerified email at uninsubria.it
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu