Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Roberto PerdisciProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Chaz LeverGeorgia Institute of TechnologyVerified email at gatech.edu
Yacin NadjiCorelight, IncVerified email at gatech.edu
Michael Donald BaileyGeorgia Institute of TechnologyVerified email at gatech.edu
Zane MaGeorgia Institute of TechnologyVerified email at gatech.edu
Yizheng ChenUniversity of MarylandVerified email at umd.edu
Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
Athanasios KountourasPhD student, Georgia Institute of technologyVerified email at gatech.edu
Mustaque AhamadGeorgia Institute of TechnologyVerified email at cc.gatech.edu
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Babak RahbariniaAssistant Professor at Auburn University MontgomeryVerified email at aum.edu
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Luca InvernizziStaff Research Scientist @ Google (CH)Verified email at google.com
Elie BurszteinSecurity and anti-abuse research lead, GoogleVerified email at google.com
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
Rosa Romero GomezSenior Data Visualization Engineer at GraphicacyVerified email at graphicacy.com
Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk