Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Robert BiddleProfessor of Computer Science and Cognitive Science, Carleton UniversityEmail verificata su hotsoft.carleton.ca
- Sonia ChiassonProfessor, School of Computer Science, Carleton UniversityEmail verificata su scs.carleton.ca
- Alain ForgetGoogleEmail verificata su scs.carleton.ca
- Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaEmail verificata su scs.carleton.ca
- David BarreraAssistant professor, Carleton UniversityEmail verificata su carleton.ca
- Jeremy ClarkConcordia UniversityEmail verificata su concordia.ca
- Shayan EskandariConcordia UniversityEmail verificata su encs.concordia.ca
- Heather MolyneauxNRCEmail verificata su nrc-cnrc.gc.ca
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverEmail verificata su itsec.uni-hannover.de
- Maximilian GollaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Philipp MarkertFormer researcher @ Ruhr University BochumEmail verificata su rub.de
- Aniqa AlamCarleton UniversityEmail verificata su carleton.ca
- N. AsokanProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Andrew PaverdMicrosoftEmail verificata su microsoft.com
- Luka MalisaETH ZurichEmail verificata su inf.ethz.ch
- David M. SommerSystem Security Group, ETH ZürichEmail verificata su inf.ethz.ch
- Irina KondratovaResearch Officer, NRCEmail verificata su nrc.ca
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaEmail verificata su ciise.concordia.ca
- Tina SafaieConcordia UniversityEmail verificata su encs.concordia.ca
- Amr YoussefConcordia UniversityEmail verificata su ciise.concordia.ca