Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Josiah ChavulaUniversity of Cape TownVerified email at cs.uct.ac.za
- David JohnsonChief Research Officer, The Vernonburg Group, Adjunct Associate Professor, UCTVerified email at cs.uct.ac.za
- Melissa DensmoreUniversity of Cape TownVerified email at acm.org
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
- Rijurekha SenAssistant Professor at IIT DelhiVerified email at cse.iitd.ac.in
- Krishna P. GummadiHead, Networked Systems Group, MPI-SWSVerified email at mpi-sws.org
- David ChoffnesAssociate Professor, Northeastern UniversityVerified email at ccs.neu.edu
- Senka HadzicUniversity of Cape TownVerified email at cs.uct.ac.za
- Agustín FormosoVerified email at ripe.net
- Gareth TysonHong Kong University of Science and TechnologyVerified email at ust.hk
- Arjuna SathiaseelanFlipped.aiVerified email at flipped.ai
- Ahmed ElmokashfiPrincipal Research Scientist, Amazon Web ServicesVerified email at amazon.com
- Enrico CalandroCybersecurity Capacity Centre for Southern Africa, University of Cape TownVerified email at researchictafrica.net
- Ihsan Ayyub QaziAssociate Professor, Department of Computer Science, LUMSVerified email at lums.edu.pk
- Satadal SenguptaPh.D. Candidate, Computer Science, Princeton UniversityVerified email at cs.princeton.edu
- Musab IsahAssistant Professor, University Hafr Al-Batin, Saudi ArabiaVerified email at uhb.edu.sa
- Vedant NandaAleph AlphaVerified email at cs.umd.edu