Get my own profile
Public access
View all21 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Roberto PerdisciProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Chaz LeverGeorgia Institute of TechnologyVerified email at gatech.edu
Yacin NadjiCorelight, IncVerified email at gatech.edu
Zane MaOregon State UniversityVerified email at oregonstate.edu
Michael Donald BaileyGeorgia Institute of TechnologyVerified email at gatech.edu
Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
Yizheng ChenUniversity of MarylandVerified email at umd.edu
Mustaque AhamadGeorgia Institute of TechnologyVerified email at cc.gatech.edu
Athanasios KountourasPhD student, Georgia Institute of technologyVerified email at gatech.edu
Babak RahbariniaAssistant Professor at Auburn University MontgomeryVerified email at aum.edu
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Luca InvernizziStaff Research Scientist @ Google (CH)Verified email at google.com
Elie BurszteinGoogle & DeepMind AI Cybersecurity technical and research leadVerified email at google.com
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
Rosa Romero GomezSenior Data Visualization Engineer at GraphicacyVerified email at graphicacy.com
Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk