Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kris GajGeorge Mason UniversityVerified email at gmu.edu
- Ekawat Homsirikamol, PhDGeorge Mason UniversityVerified email at gmu.edu
- Jens-Peter KapsAssociate Professor of Electrical and Computer Engineering, George Mason UniversityVerified email at gmu.edu
- Paweł MorawieckiPolish Academy of SciencesVerified email at ipipan.waw.pl
- Rabia ShahidUniversity of Engineering and Technology PeshawarVerified email at uetpeshawar.edu.pk
- Malik U SharifGeorge Mason UniversityVerified email at gmu.edu
- Marcin WójcikVerified email at cam.ac.uk
- Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
- Ahmad SalmanJames Madison UniversiyVerified email at jmu.edu
- Panasayya YallaSecurity Analyst, Riscure North AmericaVerified email at riscure.com
- Jacek RadzikowskiGeorge Mason UniversityVerified email at gmu.edu
- Dai BuiUniversity of California, BerkeleyVerified email at eecs.berkeley.edu