Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Selcuk UluagacFlorida International UniversityVerified email at fiu.edu
- Hidayet AksuGoogleVerified email at google.com
- Leonardo BabunSenior Cybersecurity Researcher at The Johns Hopkins University Applied Physics LabVerified email at jhuapl.edu
- Z. Berkay CelikAssistant Professor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
- Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Gang TanProfessor of computer science and engineering, Penn State UniversityVerified email at cse.psu.edu
- Trent JaegerProfessor of Computer Science and Engineering, UC RiversideVerified email at ucr.edu
- Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
- Kemal AkkayaProfessor of Computer Science, Florida International UniversityVerified email at fiu.edu
- Brendan D. SaltaformaggioAssociate Professor, Georgia Institute of TechnologyVerified email at ece.gatech.edu
- Mingxuan YaoGeorgia Institute of TechnologyVerified email at gatech.edu
- Shammya Shananda SahaEngineer, EPRIVerified email at epri.com
- Sharraf SaminDoctoral Student, Department of Health Promotion, Education & Behavior, Arnold School of PublicVerified email at email.sc.edu
- Ahmet ArıºSecurity Engineer at BeyondTrustVerified email at beyondtrust.com
Follow