Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Robin KravetsUniversity of IllinoisEmail verificata su illinois.edu
- Soteris DemetriouAssistant Professor, Imperial College LondonEmail verificata su imperial.ac.uk
- Ahmed HelmyAssoc. Dean for Research, College of Computing, UNC CharlotteEmail verificata su charlotte.edu
- Giacomo BenincasaAmazonEmail verificata su amazon.com
- Vansh KhannaUniversity of Illinois at Urbana ChampaignEmail verificata su illinois.edu
- Roy WantResearch Scientist, GoogleEmail verificata su google.com
- Karan GanjuUniversity of Illinois Urbana-ChampaignEmail verificata su illinois.edu
- Jingyu QianUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- hari sundaramUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Abbas AcarFlorida International UniversityEmail verificata su fiu.edu
- Ahmet ArışSecurity Engineer at BeyondTrustEmail verificata su beyondtrust.com
- Harun OzGraduate Research Assistant, Florida International UniversityEmail verificata su fiu.edu
- Selcuk UluagacFlorida International UniversityEmail verificata su fiu.edu
- Masooda BashirAssociate Professor of Information Science, University of Illinois at Urbana ChampaignEmail verificata su illinois.edu
- Hsiao-Ying HuangPhD in Informatics, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Leonardo BabunSenior Cybersecurity Researcher at the Johns Hopkins University Applied Physics LaboratoryEmail verificata su jhuapl.edu
- Faraz NaseemGraduate Research Assistant, Florida International UniversityEmail verificata su fiu.edu
- Bram BonnéSoftware Engineer, GoogleEmail verificata su google.com
- René MayrhoferJohannes Kepler University LinzEmail verificata su jku.at