Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John S. BarasProfessor of Ellectrical and Computer Engineering, University of MarylandVerified email at umd.edu
Reza ShokriAssistant Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Jean-Yves Le BoudecProfessor of Communication Systems, EPFLVerified email at epfl.ch
Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
Carmela TroncosoEPFLVerified email at epfl.ch
Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
Dr Eirini AnthiCybersecurity Lecturer, Cardiff UniversityVerified email at cardiff.ac.uk
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
Ehsan KazemiGoogleVerified email at google.com
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Ioannis StavrakakisProfessor of Computer Science / Telecommunications, National and Kapodistrian University of AthensVerified email at di.uoa.gr
Mahesh K. MarinaSchool of Informatics, The University of EdinburghVerified email at inf.ed.ac.uk
Svetlana RadosavacInstitutional Shareholder ServicesVerified email at issgovernance.com
Hugh LeatherUniversity of EdinburghVerified email at inf.ed.ac.uk
Thanasis PapaioannouAssistant Professor, NKUA, Greece & Senior Researcher, AUEB, GreeceVerified email at aueb.gr
Spyros LalisAssociate Professor of Computer Science, University of ThessalyVerified email at inf.uth.gr
Grigorios Loukides, PhDKing's College LondonVerified email at kcl.ac.uk