Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Kevin BauerMIT Lincoln LaboratoryVerified email at ll.mit.edu
Yazan BoshmafQatar Computing Research Institute, HBKUVerified email at hbku.edu.qa
Husam Al JawaheriQatar Computing Research Institute, HBKUVerified email at hbku.edu.qa
Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Srinivas DevadasEdwin Sibley Webster Professor of Electrical Engineering and Computer Science, MITVerified email at mit.edu
Aiman ErbadProfessor, Qatar UniversityVerified email at qu.edu.qa
Mohamed NabeelPalo Alto Networks/National UniversityVerified email at cs.purdue.edu
Albert KwonMITVerified email at mit.edu
Marc DacierRC3, CEMSE - KAUSTVerified email at kaust.edu.sa
David LazarMIT CSAILVerified email at mit.edu
Gabriele OligeriAssociate Professor, College of Science and Engineering, Hamad bin Khalifa University, Doha, QatarVerified email at hbku.edu.qa
Roger DingledineThe Tor ProjectVerified email at freehaven.net
Euijin ChooUniversity of AlbertaVerified email at ualberta.ca
Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
Dirk GrunwaldUniversity of ColoradoVerified email at colorado.edu
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Lamiaa BasyoniKINDI Center for Computing Research,College of Engineering, Qatar University, QatarVerified email at qu.edu.qa
Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
Ilia Lebedevgradient.tech, MITVerified email at gradient.tech
Dimitrios SerpanosUniversity of Patras & Computer Technology InstituteVerified email at ece.upatras.gr