Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Urs HengartnerUniversity of WaterlooVerified email at uwaterloo.ca
- Syed Ali KhayamAmazon Web ServicesVerified email at seecs.edu.pk
- Daniel VogelUniversity of WaterlooVerified email at uwaterloo.ca
- Jiayi ChenPh.D., University of WaterlooVerified email at uwaterloo.ca
- Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca
- Irfan Ul HaqPhD student at IMDEA Software InstitueVerified email at imdea.org
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
- Ali SajjadBT Applied ResearchVerified email at bt.com
- Yousra JavedAssistant Professor of Cybersecurity, Illinois State UniversityVerified email at ilstu.edu
- Ravi KuberAssociate Professor, UMBCVerified email at umbc.edu
- Rozita DaraAssociate Professor, University of GuelphVerified email at uoguelph.ca