Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
- Ryan ShahSecurity Consultant, SapphireVerified email at hw.ac.uk
- Joseph GardinerUniversity of Bristol; Lancaster UniversityVerified email at lancaster.ac.uk
- Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
- Chi-Yao HongGoogleVerified email at google.com
- Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
- Kaspar Rosager LudvigsenAssistant Professor, University of DurhamVerified email at durham.ac.uk
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
- Pragya AgarwalLoughborough UniversityVerified email at lboro.ac.uk
- Angela DalyUniversity of DundeeVerified email at dundee.ac.uk
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Chuadhry Mujeeb AhmedNewcastle UniversityVerified email at newcastle.ac.uk
- Dipak GhosalProfessor of Computer Science, University of California, DavisVerified email at ucdavis.edu
- Arnab Kumar BiswasResearch Fellow at National University of SingaporeVerified email at nus.edu.sg
- Virajith JalapartiMicrosoftVerified email at microsoft.com
- Aridaman TripathiVerified email at fb.com
- Prof. N. BalakrishnanIndian Institute of ScienceVerified email at serc.iisc.ernet.in
- Bharath VenkateshServiceNowVerified email at servicenow.com
- Djamila AouadaSenior Research Scientist, Interdisciplinary Centre for Security, Reliability, and Trust (SnTVerified email at uni.lu
Follow
Shishir Nagaraja
Professor of Cybersecurity, University of Newcastle
Verified email at newcastle.ac.uk