Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Verified email at sci.brooklyn.cuny.edu
Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov
Fangfei ChenAkamai TechnologiesVerified email at akamai.com
Petros ZerfosIBM T.J. Watson Research CenterVerified email at us.ibm.com
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Follow