Get my own profile
Public access
View all14 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Daniela RusAndrew (1956) and Erna Viterbi Professor of Computer Science, MITVerified email at csail.mit.edu
- Paul ThompsonProfessor of Neurology & Psychiatry, Imaging Genetics Center, USCVerified email at usc.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Javed AslamProfessor, Khoury College of Computer Sciences, Northeastern UniversityVerified email at ccs.neu.edu
- Florin ConstantinGoogle Inc, CAVerified email at eecs.harvard.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
- Michael WellmanProfessor of Computer Science & Engineering, University of MichiganVerified email at umich.edu
- Sridhar VenkatesanPeraton LabsVerified email at peratonlabs.com
- Diego HernandoAssociate Professor, University of Wisconsin-MadisonVerified email at wisc.edu
- Jim HendlerProfessor of computer science, RPIVerified email at cs.rpi.edu
- Charles Van LoanCornell UniversityVerified email at cs.cornell.edu
- John MurphyTenet3, LLCVerified email at dartmouth.edu
- Daniel Yaacov BilarVerified email at pm.me
- Francis SullivanIDA Center for Computing SciencesVerified email at super.org
- Santiago Aja FernandezLPI, Universidad de ValladolidVerified email at tel.uva.es
- Carlos Alberola LópezCatedrático de la Universidad de ValladolidVerified email at tel.uva.es
- Carl E. LandwehrUniversity of Michigan, George Washington University and Independent ConsultantVerified email at umich.edu
- Alan S. WillskyProfessor of EECS, MITVerified email at mit.edu
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu