Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rafael DowsleyMonash UniversityVerified email at monash.edu
Martine De CockProfessor, University of Washington TacomaVerified email at uw.edu
Jörn Müller-QuadeProfessor für Informatik, Karlsruhe Institute of TechnologyVerified email at kit.edu
Bin YuAdobeVerified email at adobe.com
Akira OtsukaGraduate School of Information Security, Institute of Information Security (IISEC)Verified email at iisec.ac.jp
Andreas WinterICREA & Universitat Autňnoma de BarcelonaVerified email at uab.cat
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Jeroen van de GraafProfessor de Cięncia da Computaçăo, Universidade Federal de Minas GeraisVerified email at dcc.ufmg.br
Kirill MorozovUniversity of North Texas, USAVerified email at unt.edu
Davis RailsbackUniversity of WashingtonVerified email at uw.edu
Mayana PereiraMicrosoftVerified email at microsoft.com
Sikha PentyalaUniversity of Washington TacomaVerified email at uw.edu
Rajendra KattiUniversity of Washington TacomaVerified email at uw.edu
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Jonathan PeckGhent UniversityVerified email at ugent.be
Femi OlumofinGoogleVerified email at google.com
Chhaya ChoudharyInfobloxVerified email at infoblox.com
Jiaming HuApple IncVerified email at apple.com
Jianwei ShenPhD student, University of ArizonaVerified email at email.arizona.edu
Rafael Timóteo de Sousa JúniorNetwork Engineering Professor, University of Brasilia (UnB)Verified email at unb.br