Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Karl MeinkeProfessor of Computer Science KTH Royal Institute of TechnologyVerified email at kth.se
- Soumajit PalCenter for Cyber Security, Amrita UniversityVerified email at am.amrita.edu
- surendran kAmrita Center for Cyber SecurityVerified email at am.amrita.edu
- Hrudya PResearch Associate at CISAI, Amrita Vishwa VidyapeethamVerified email at am.amrita.edu
- Thara SAssistant Professor, Amrita Vishwa VidyapeethamVerified email at am.amrita.edu
- Gregory L. HeilemanUniversity of ArizonaVerified email at arizona.edu
- Prabaharan P (Praba) PhD, CISSP, CI...Amrita University, Amrita Vishwa VidyapeethamVerified email at am.amrita.edu
- rachael sugarsAssociate Professor, Karolinska InstitutetVerified email at ki.se
- Sai Sreewathsa KovalluriAmrita Vishwa VidyapeethamVerified email at am.amrita.edu
- Soman K.PHead, CEN, AMRITA VISHWA VIDYAPEETHAMVerified email at amrita.edu
- Sreeram Rajendran/e/ FoundationVerified email at e.email
- Shivsubramani KrishnamoorthyAmrita Vishwa Vidyapeetham (Amrita University), IndiaVerified email at amrita.edu