Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John S. BarasProfessor of Ellectrical and Computer Engineering, University of MarylandVerified email at umd.edu
Reza ShokriNational University of Singapore; MicrosoftVerified email at comp.nus.edu.sg
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Jean-Yves Le BoudecHonorary professor of communication systems, EPFLVerified email at epfl.ch
Dr Eirini AnthiCybersecurity Lecturer, Cardiff UniversityVerified email at cardiff.ac.uk
Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
Carmela TroncosoEPFLVerified email at epfl.ch
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
Ehsan KazemiGoogleVerified email at google.com
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Ioannis StavrakakisProfessor of Computer Science / Telecommunications, National and Kapodistrian University of AthensVerified email at di.uoa.gr
Mahesh K. MarinaSchool of Informatics, The University of EdinburghVerified email at inf.ed.ac.uk
Svetlana RadosavacInstitutional Shareholder ServicesVerified email at issgovernance.com
Hugh LeatherUniversity of EdinburghVerified email at inf.ed.ac.uk
Thanasis PapaioannouAssistant Professor, NKUA, Greece & Senior Researcher, AUEB, GreeceVerified email at aueb.gr
Spyros LalisProfessor of Computer Science, University of ThessalyVerified email at inf.uth.gr
Grigorios Loukides, PhDKing's College LondonVerified email at kcl.ac.uk