Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Ting-Fang YenLaceworkVerified email at lacework.net
Alina OpreaNortheastern UniversityVerified email at neu.edu
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
Abdelberi ChaabaneBell LabsVerified email at chaabane.org
Andrea LanziAssociate Professor at Department Computer Science at University of MilanVerified email at unimi.it
Ahmet Salih BüyükkayhanMicrosoftVerified email at iseclab.org
Collin MullinerMUlliNER.ORGVerified email at mulliner.org
Bahruz JabiyevCybersecurity PhD candidate, Northeastern UniversityVerified email at northeastern.edu
Erik-Oliver BlassSenior Research Scientist, Airbus Senior Expert for Applied CryptographyVerified email at airbus.com
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Travis MayberryUS Naval AcademyVerified email at usna.edu
Ali MirheidariVerified email at ex-staff.unitn.it
Christopher KruegelUniversity of California, Santa Barbara and VMware, Inc.Verified email at cs.ucsb.edu
Steven SprecherNortheastern UniversityVerified email at northeastern.edu
Ali Osman UlusoyGoogleVerified email at google.com
Sevtap DumanFaculty at Ege UniversityVerified email at husky.neu.edu
Sajjad "JJ" ArshadGooglerVerified email at iseclab.org