Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Urs HengartnerUniversity of WaterlooVerified email at uwaterloo.ca
Syed Ali KhayamAmazon Web ServicesVerified email at seecs.edu.pk
Daniel VogelUniversity of WaterlooVerified email at uwaterloo.ca
Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
Irfan Ul HaqPhD student at IMDEA Software InstitueVerified email at imdea.org
Jiayi ChenPh.D., University of WaterlooVerified email at uwaterloo.ca
Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Ali SajjadBT Applied ResearchVerified email at bt.com
Yousra JavedAssistant Professor of Cybersecurity, Illinois State UniversityVerified email at ilstu.edu
Ravi KuberAssociate Professor, UMBCVerified email at umbc.edu
Rozita DaraAssociate Professor, University of GuelphVerified email at uoguelph.ca