Get my own profile
Public access
View all29 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyVerified email at rit.edu
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Nacho (Ignacio) SolisLinkedInVerified email at igso.net
Cesar GhaliSoftware Engineer, GoogleVerified email at uci.edu
Colin PerkinsSenior Lecturer (Associate Professor), School of Computing Science, University of GlasgowVerified email at csperkins.org
Marcin LukowiakRochester Institute of TechnologyVerified email at rit.edu
G FairhurstVerified email at erg.abdn.ac.uk
Philipp S. TieselTU BerlinVerified email at inet.tu-berlin.de
Stanisław RadziszowskiRochester Institute of TechnologyVerified email at cs.rit.edu
Anna BrunstromProfessor in Computer Scienec, Karlstad UniversityVerified email at kau.se
Jun KuriharaZettant Inc.Verified email at ieee.org
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
Paolo GastiAssociate Professor at New York Institute of TechnologyVerified email at nyit.edu
Michael T KurdzielMember of Technical Staff, L3Harris; Adjunct Professor, Rochester Institute of TechnologyVerified email at L3Harris.com
James R VallinoProfessor of Software Engineering, Rochester Institute of TechnologyVerified email at se.rit.edu
Gergely AcsResearch Engineer, INRIAVerified email at inria.fr
Matthias WählischProfessor and Chair of Distributed and Networked Systems, TU Dresden, BI Research FellowVerified email at tu-dresden.de
Edith C. H. NgaiAssociate Professor, Dept. of Electrical and Electronic Engineering, The University of Hong KongVerified email at eee.hku.hk
Edmund YehNortheastern UniversityVerified email at ece.neu.edu
Ivan De Oliveira NunesUniversity of ZurichVerified email at ifi.uzh.ch