Get my own profile
Public access
View all58 articles
12 articles
available
not available
Based on funding mandates
Co-authors
Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
Ramachandran RamjeeMicrosoft Research IndiaVerified email at microsoft.com
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
malathi veeraraghavanUniversity of VirginiaVerified email at virginia.edu
Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Verified email at sci.brooklyn.cuny.edu
Patrick TraynorUniversity of FloridaVerified email at cise.ufl.edu
Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Srikanth KrishnamurthyUC RiversideVerified email at cs.ucr.edu
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Fangfei ChenAkamai TechnologiesVerified email at akamai.com
William EnckProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Dr Archan MISRA _Vice Provost (Research) & Professor, School of Computing and Information SystemsVerified email at smu.edu.sg
Ender AyanogluProfessor of Electrical Engineering and Computer Science, University of California, IrvineVerified email at uci.edu
Chiara Petriolicomputer science and engineering professor, university of rome la sapienzaVerified email at diag.uniroma1.it
Ted Brownprofessor computer science, queensVerified email at gc.cuny.edu
srikar tatiPennsylvania State University; VMwareVerified email at vmware.com
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com