Get my own profile
Public access
View all4 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
- Giuseppe PetraccaPhD Candidate, Pennsylvania State UniversityVerified email at psu.edu
- Trent JaegerProfessor of Computer Science and Engineering, UC RiversideVerified email at ucr.edu
- Yuqiong SunFacebook, Applied Privacy TechnologiesVerified email at fb.com
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Ravishankar BorgaonkarResearch Fellow, University of OxfordVerified email at cs.ox.ac.uk
- Ranjbar A. BalisaneUniversity of Oxford and Soran UniversityVerified email at cybersecurity.ox.ac.uk
- Andrew PaverdMicrosoftVerified email at microsoft.com
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Meni OrenbachSecurity Researcher, NVIDIAVerified email at nvidia.com
- Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
- Jon CrowcroftUniversity of CambridgeVerified email at cl.cam.ac.uk
- Erisa KarafiliAssociate Professor, Electronics and Computer Science, University of SouthamptonVerified email at soton.ac.uk
- Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
- Nguyen An ThanhVerified email at tiengiang.gov.vn