Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Ryan ShahPostdoctoral Research Associate at Heriot-Watt UniversityVerified email at hw.ac.uk
Joseph GardinerUniversity of Bristol; Lancaster UniversityVerified email at lancaster.ac.uk
Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Chi-Yao HongGoogleVerified email at google.com
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Pragya AgarwalLoughborough UniversityVerified email at lboro.ac.uk
Kaspar Rosager LudvigsenPhD StudentVerified email at strath.ac.uk
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Angela DalyUniversity of DundeeVerified email at dundee.ac.uk
Dipak GhosalProfessor of Computer Science, University of California, DavisVerified email at ucdavis.edu
Arnab Kumar BiswasResearch Fellow at National University of SingaporeVerified email at nus.edu.sg
Aridaman TripathiVerified email at fb.com
Djamila AouadaSenior Research Scientist, Interdisciplinary Centre for Security, Reliability, and Trust (SnTVerified email at uni.lu
Prof. N. BalakrishnanIndian Institute of ScienceVerified email at serc.iisc.ernet.in
Bharath VenkateshAssociate Director at Tiger AnalyticsVerified email at tigeranalytics.com
Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Ian WassellUniversity of CambridgeVerified email at cam.ac.uk
Follow
Shishir Nagaraja
Professor of Cybersecurity, University of Newcastle
Verified email at newcastle.ac.uk