Get my own profile
Co-authors
- Tooska DargahiSenior Lecturer in Cybersecurity, Manchester Metropolitan University, UKVerified email at mmu.ac.uk
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
- Hamid Haj Seyyed javadiProfessor of Computer Engineering, Shahed UniversityVerified email at shahed.ac.ir
- Zubair ShafiqUniversity of California, DavisVerified email at ucdavis.edu
- Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, GA, USAVerified email at kennesaw.edu
- Umar IqbalAssistant Professor, Washington University in St. LouisVerified email at wustl.edu
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
- giuseppe bianchiUniversità di Roma Tor VergataVerified email at uniroma2.it
- Franziska RoesnerAssociate Professor, Paul G. Allen School of Computer Science & Engineering, Univ. of WashingtonVerified email at cs.washington.edu
- Hao CuiUniversity of California, IrvineVerified email at uci.edu
- Rahmadi TrimanandaComcast Cyber Security ResearchVerified email at comcast.com
- Alexander Gamero-GarridoAsst. Professor of Computer Science, UC DavisVerified email at ucdavis.edu
- Daniel J. DuboisNortheastern UniversityVerified email at northeastern.edu
- David ChoffnesAssociate Professor, Northeastern UniversityVerified email at ccs.neu.edu
- Athina MarkopoulouProfessor, EECS, UC IrvineVerified email at uci.edu
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu