Get my own profile
Public access
View all4 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Giuseppe PetraccaPhD Candidate, Pennsylvania State UniversityVerified email at psu.edu
Trent JaegerProfessor of Computer Science and Engineering, UC RiversideVerified email at ucr.edu
Yuqiong SunFacebook, Applied Privacy TechnologiesVerified email at fb.com
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Ravishankar BorgaonkarResearch Fellow, University of OxfordVerified email at cs.ox.ac.uk
Ranjbar A. BalisaneUniversity of Oxford and Soran UniversityVerified email at cybersecurity.ox.ac.uk
Andrew PaverdMicrosoftVerified email at microsoft.com
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
Meni OrenbachSecurity Researcher, NVIDIAVerified email at nvidia.com
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Jon CrowcroftUniversity of CambridgeVerified email at cl.cam.ac.uk
Erisa KarafiliAssociate Professor, Electronics and Computer Science, University of SouthamptonVerified email at soton.ac.uk
Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
Nguyen An ThanhVerified email at tiengiang.gov.vn