Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
alessandra russoProfessor in Applied Computational LogicVerified email at imperial.ac.uk
Qun NiSoftware Engineer, Google IncVerified email at google.com
Emil LupuProfessor of Computer SystemsVerified email at imperial.ac.uk
Arcot RajasekarProfessor of Information Science, University of North Carolina at Chapel HillVerified email at unc.edu
Jiefei MaResearch Associate in Computing, Imperial College LondonVerified email at imperial.ac.uk
Dan LinProfessor of Computer Science, Director of I-Privacy Lab, Vanderbilt UniversityVerified email at vanderbilt.edu
Ian MolloyIBM ResearchVerified email at us.ibm.com
Chitta BaralProfessor of Computer Science, Arizona State UniversityVerified email at asu.edu
Morris SlomanDepartment of Computing, Imperial College LondonVerified email at imperial.ac.uk
Randeep BhatiaBell Labs, NokiaVerified email at research.bell-labs.com
Kang-Won LeeVP, Head of Cloud, SK Telecom, IBM ResearchVerified email at sk.com
Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
Windhya RankothgePostdoctoral Research Fellow, Canadian Institute for Cyber SecurityVerified email at unb.ca
Dinesh VermaIBMVerified email at us.ibm.com
Jan ChomickiProfessor of Computer Science and Engineering, SUNY at BuffaloVerified email at buffalo.edu
Goce TrajcevskiDept. of ECpE, Iowa State UniversityVerified email at iastate.edu
Prof. Arosha K. BandaraProfessor of Software Engineering, The Open UniversityVerified email at open.ac.uk
Alberto TrombettaAssociate Professor of Computer Science, University of InsubriaVerified email at uninsubria.it
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu