Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dirk GrunwaldUniversity of ColoradoVerified email at colorado.edu
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Mashael AlSabahQatar Computing Research InstituteVerified email at hbku.edu.qa
Tadayoshi KohnoProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
Roger DingledineThe Tor ProjectVerified email at freehaven.net
William StreileinMIT Lincoln LaboratoryVerified email at ll.mit.edu
Eric AndersonNortheastern UniversityVerified email at northeastern.edu
Anders DrachenProfessor, SDU Metaverse Lab, University of Southern DenmarkVerified email at york.ac.uk
Robert W D VeitchHead of Data, SEEKVerified email at cbs.dk
Tao WangAssistant Professor, Simon Fraser UniversityVerified email at sfu.ca
Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Janne LindqvistAalto University (Computer Science)Verified email at aalto.fi
Greg GrudicContext Data AnalyticsVerified email at contextdataanalytics.com
Caleb PhillipsNational Renewable Energy LaboratoryVerified email at smallwhitecube.com
Thomas HobsonMIT Lincoln LaboratoryVerified email at ll.mit.edu