Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
- Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
- Xiaoyin WangAssociate Professor, University of Texas at San AntonioVerified email at utsa.edu
- Mitra Bokaei HosseiniAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
- Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
- Florian SchaubUniversity of MichiganVerified email at umich.edu
- Hanan HibshiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Smita GhaisasTata Consultancy Services ltd. TRDDCVerified email at tcs.com
- Elena PetersonPacific Northwest National LaboratoryVerified email at pnnl.gov
- Daniel M. BestSr. Cyber Security Researcher, PNNLVerified email at pnnl.gov
- Jane Cleland-HuangUniversity of Notre DameVerified email at nd.edu
- Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu