Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
- Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
- David ChoffnesAssociate Professor, Northeastern UniversityVerified email at ccs.neu.edu
- Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
- Alan MisloveProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Bryan C. WardVanderbilt UniversityVerified email at vanderbilt.edu
- Arash Molavi KakhkiThousandEyesVerified email at thousandeyes.com
- Benjamin E. UjcichGeorgetown UniversityVerified email at georgetown.edu
- Adam BatesAssistant Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- William H SandersCarnegie Mellon UniversityVerified email at cmu.edu
- Endadul HoqueSyracuse UniversityVerified email at syr.edu
- Juliana FurgalaCybersecurity Researcher, MIT Lincoln LaboratoryVerified email at mit.edu
- Nathan BurowMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Matthew JagielskiGoogle DeepMindVerified email at google.com
- Shawn OstermannSenior Associate Dean, Russ College of Engineering and Technology, Ohio UniversityVerified email at ohio.edu
- Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryVerified email at ll.mit.edu
- Anne EdmundsonPrinceton UniversityVerified email at alumni.princeton.edu
- Hyojeong LeePurdue UniversityVerified email at purdue.edu
- Dan GoldwasserPurdue UniversityVerified email at purdue.edu
- Maria Leonor PachecoAssistant Professor, University of Colorado BoulderVerified email at colorado.edu