Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sean ThorpeAssociate Professor Computer Science ,University of Technology,JamaicaVerified email at utech.edu.jm
Varun BhagwanYahoo, IBMVerified email at yahoo-inc.com
E. Michael MaximilienDistinguished Engineer, IBM CloudVerified email at us.ibm.com
Morris SlomanDepartment of Computing, Imperial College LondonVerified email at imperial.ac.uk
Daniel GruhlGoogleVerified email at us.ibm.com
Indrajit RayProfessor, Computer Science, Colorado State UniversityVerified email at colostate.edu
Evimaria TerziProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
Alfredo albaIBM Almaden Reserach centerVerified email at us.ibm.com
Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
Jan H PieperGoogle, IBMVerified email at google.com
Youssef DrissiIBM ResearchVerified email at us.ibm.com
Julian JarrettLutron ElectronicsVerified email at lutron.com
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
Claudio ArdagnaRicercatore, Università degli Studi di MilanoVerified email at unimi.it
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Judith McNamaraQueensland University of TechnologyVerified email at qut.edu.au
Kaan KatirciogluMicrosoftVerified email at microsoft.com
Colin HarrisonEmeritus Professor, University of NottinghamVerified email at nottingham.ac.uk
M. Brian BlakePresident, Georgia State UniversityVerified email at gsu.edu