Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Andrew MartinProfessor of Systems Security, University of OxfordEmail verificata su cs.ox.ac.uk
- Giuseppe PetraccaPhD Candidate, Pennsylvania State UniversityEmail verificata su psu.edu
- Trent JaegerProfessor of Computer Science and Engineering, UC RiversideEmail verificata su ucr.edu
- Yuqiong SunFacebook, Applied Privacy TechnologiesEmail verificata su fb.com
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Ravishankar BorgaonkarResearch Fellow, University of OxfordEmail verificata su cs.ox.ac.uk
- Ranjbar A. BalisaneUniversity of Oxford and Soran UniversityEmail verificata su cybersecurity.ox.ac.uk
- Andrew PaverdMicrosoftEmail verificata su microsoft.com
- Jason R.C. NurseReader in Cyber Security, University of KentEmail verificata su kent.ac.uk
- Meni OrenbachSecurity Researcher, NVIDIAEmail verificata su nvidia.com
- Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonEmail verificata su cs.wisc.edu
- Jon CrowcroftUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Erisa KarafiliAssociate Professor, Electronics and Computer Science, University of SouthamptonEmail verificata su soton.ac.uk
- Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHEmail verificata su ubitech.eu
- Nguyen An ThanhEmail verificata su tiengiang.gov.vn