Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sean ThorpeAssociate Professor Computer Science ,University of Technology,JamaicaVerified email at utech.edu.jm
- Varun BhagwanYahoo, IBMVerified email at yahoo-inc.com
- E. Michael MaximilienDistinguished Engineer, IBM CloudVerified email at us.ibm.com
- Morris SlomanDepartment of Computing, Imperial College LondonVerified email at imperial.ac.uk
- Daniel GruhlGoogleVerified email at us.ibm.com
- Indrajit RayProfessor, Computer Science, Colorado State UniversityVerified email at colostate.edu
- Evimaria TerziProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
- Alfredo albaIBM Almaden Reserach centerVerified email at us.ibm.com
- Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
- Jan H PieperGoogle, IBMVerified email at google.com
- Youssef DrissiIBM ResearchVerified email at us.ibm.com
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
- Claudio ArdagnaRicercatore, Università degli Studi di MilanoVerified email at unimi.it
- Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
- Julian JarrettLutron ElectronicsVerified email at lutron.com
- Judith McNamaraQueensland University of TechnologyVerified email at qut.edu.au
- Kaan KatirciogluMicrosoftVerified email at microsoft.com
- Colin HarrisonEmeritus Professor, University of NottinghamVerified email at nottingham.ac.uk
- M. Brian BlakePresident, Georgia State UniversityVerified email at gsu.edu