Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
- Michael JacobsGeorge Mason UniversityVerified email at iongroup.com
- Eric RobertsonPAR GovernmentVerified email at partech.com
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
- Eric T. HarleyHarley Labs, LLCVerified email at ericharley.com
- Vijay V RaghavanAlfred and Helen Lamson Endowed Professor in Computer Science, University of Louisiana at LafayetteVerified email at louisiana.edu
- Cheehung henry ChuUniversity of Louisiana at LafayetteVerified email at louisiana.edu
- Vipin SwarupThe MITRE CorporationVerified email at mitre.org
- Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
- Matthew ElderJohns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
- Ingrid DaubechiesDuke UniversityVerified email at math.duke.edu
- Pierre TrepagnierVerified email at ll.mit.edu
- James CurboJohns Hopkins UniversityVerified email at jhu.edu
- Ben KingUniversity of MichiganVerified email at umich.edu
- Alexander KottUS Army Research LaboratoryVerified email at army.mil
- Luis Muñoz-GonzálezSenior Research Scientist, Telefónica ResearchVerified email at telefonica.com
- Diane S. HenshelO'Neill School of Public and Environmental Affairs, Indiana UniversityVerified email at indiana.edu
- Igor LinkovUS Army Corps of EngineersVerified email at usace.army.mil
- Lynn KeuthanThe George Washington UniversityVerified email at gwu.edu
Follow