Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Urs HengartnerUniversity of WaterlooEmail verificata su uwaterloo.ca
- Syed Ali KhayamAmazon Web ServicesEmail verificata su seecs.edu.pk
- Daniel VogelUniversity of WaterlooEmail verificata su uwaterloo.ca
- Jiayi ChenPh.D., University of WaterlooEmail verificata su uwaterloo.ca
- Ehab Al-ShaerCarnegie Mellon UniversityEmail verificata su cmu.edu
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaEmail verificata su ciise.concordia.ca
- Irfan Ul HaqPhD student at IMDEA Software InstitueEmail verificata su imdea.org
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonEmail verificata su city.ac.uk
- Ali SajjadBT Applied ResearchEmail verificata su bt.com
- Yousra JavedAssistant Professor of Cybersecurity, Illinois State UniversityEmail verificata su ilstu.edu
- Ravi KuberAssociate Professor, UMBCEmail verificata su umbc.edu
- Rozita DaraAssociate Professor, University of GuelphEmail verificata su uoguelph.ca