Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Zhen HuangAssistant Professor, School of Computing, DePaul UniversityEmail verificata su depaul.edu
- Lionel LittyMenlo SecurityEmail verificata su menlosecurity.com
- Wei HuangUniversity of TorontoEmail verificata su mail.utoronto.ca
- Mark HorowitzProfessor of Electrical Engineering and Computer ScienceEmail verificata su ee.stanford.edu
- Beom Heyn KimHanyang University ERICAEmail verificata su hanyang.ac.kr
- John C MitchellProfessor of Computer Science, Stanford UniversityEmail verificata su Stanford.edu
- Michelle WongUniversity of TorontoEmail verificata su mail.utoronto.ca
- Dan BonehProfessor of Computer Science, Stanford UniversityEmail verificata su cs.stanford.edu
- Marsha ChechikProfessor of Computer Science, University of TorontoEmail verificata su cs.toronto.edu
- Petros ManiatisStaff Research Scientist, GoogleEmail verificata su google.com
- patrick lincolnSRIEmail verificata su sri.com
- Afshar GanjaliApplication Security Researcher, Security CompassEmail verificata su utoronto.ca
- Zoran DimitrijevicAirbnb LabsEmail verificata su ext.airbnb.com
- Dejan MilojicicHewlett Packard LabsEmail verificata su hpe.com
- Phillipa GillResearch Scientist @ GoogleEmail verificata su google.com
- Úlfar ErlingssonArchitect at LaceworkEmail verificata su lacework.net
- Ilya MironovMetaEmail verificata su meta.com
- Yashar GanjaliProfessor of Computer Science, University of TorontoEmail verificata su cs.toronto.edu
- Sukwon OhUniversity of TorontoEmail verificata su mail.utoronto.ca
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaEmail verificata su ciise.concordia.ca