Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Verified email at sci.brooklyn.cuny.edu
- Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
- Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
- Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
- Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
- Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov
- Fangfei ChenAkamai TechnologiesVerified email at akamai.com
- Petros ZerfosIBM T.J. Watson Research CenterVerified email at us.ibm.com
- Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Follow