Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Alex C. SnoerenUC San DiegoVerified email at cs.ucsd.edu
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Kirill LevchenkoUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Noah ApthorpeAssistant Professor of Computer Science, Colgate UniversityVerified email at colgate.edu
Gunes AcarRadboud UniversityVerified email at cs.ru.nl
Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
Chris GrierUniversity of California, BerkeleyVerified email at imchris.org
Nicholas WeaverInternational Computer Science InstituteVerified email at berkeley.edu
Elie BurszteinGoogle & DeepMind AI Cybersecurity technical and research leadVerified email at google.com
Frank LiAssistant Professor, Georgia TechVerified email at gatech.edu
Hitesh DharmdasaniInformant NetworksVerified email at informantnetworks.com
Vacha DaveMicrosoft CorporationVerified email at microsoft.com
Sarah MeiklejohnProfessor at University College LondonVerified email at ucl.ac.uk
Luca InvernizziStaff Research Scientist @ Google (CH)Verified email at google.com
Marshini ChettyUniversity of ChicagoVerified email at uchicago.edu
Dillon ReismanVerified email at nyu.edu
Thomas J. HoltSchool of Criminal Justice, Michigan State UniversityVerified email at msu.edu
Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.edu