Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
Georgios PortokalidisStevens Institute of TechnologyVerified email at stevens.edu
Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Michalis PolychronakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
Pratap PrabhuColumbia UniversityVerified email at rootshell.in
George C. PolyzosProfessor of Computer Science, Athens University of Economics & BusinessVerified email at aueb.gr
kangkook JeeAssistant professor, University of Texas at DallasVerified email at utdallas.edu
Pantelis A. FrangoudisDistributed Systems Group, TU Wien, AustriaVerified email at dsg.tuwien.ac.at
Stelios Sidiroglou-DouskosMIT CSAILVerified email at csail.mit.edu
Vasilis PappasColumbia UniversityVerified email at cs.columbia.edu
Yossi OrenSenior Lecturer (≝Assistant Professor) at Ben Gurion University's Cyber Security Research CenterVerified email at bgu.ac.il
Di JinBrown UniversityVerified email at brown.edu
Junfeng YangAssociate Professor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Theofilos PetsiosVerified email at cs.columbia.edu
Elias AthanasopoulosAssociate Professor, University of CyprusVerified email at cs.ucy.ac.cy
Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
George XylomenosProfessor of Computer Science, Athens University of Economics and BusinessVerified email at aueb.gr
Rodrigo FonsecaPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
Zhenyu WuNEC Laboratories America Inc.Verified email at nec-labs.com
Kangjie LuAssistant Professor, University of MinnesotaVerified email at umn.edu
Follow