Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Manos AntonakakisGeorgia Institute of TechnologyVerified email at gatech.edu
- Chaz LeverGeorgia Institute of TechnologyVerified email at gatech.edu
- Yizheng ChenUniversity of MarylandVerified email at umd.edu
- Yacin NadjiCorelight, IncVerified email at gatech.edu
- Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk
- Rosa Romero GomezSenior Data Visualization Engineer at GraphicacyVerified email at graphicacy.com
- Athanasios KountourasPhD student, Georgia Institute of technologyVerified email at gatech.edu
- Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
- Najmeh MiramirkhaniStony Brook UniversityVerified email at cs.stonybrook.edu
- Michalis PolychronakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
- Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyVerified email at ece.gatech.edu
- Nguyen Phong HoangUniversity of ChicagoVerified email at uchicago.edu
- Athanasios AvgetidisPhD student, Georgia Institute of TechnologyVerified email at gatech.edu
- Jan J WernerRed HatVerified email at redhat.com
- Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
- Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
- Chris MarkouIATAVerified email at iata.org