Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
John HatcliffUniversity Distinguished Professor, Department of Computing and Information Sciences, Kansas StateVerified email at ksu.edu
Denis Foo KuneAmazon Web ServicesVerified email at amazon.com
Krishna VenkatasubramanianThe University of Rhode IslandVerified email at uri.edu
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
Julian M GoldmanMassachusetts General HospitalVerified email at mgh.harvard.edu
Sandy WeiningerUS FDAVerified email at fda.hhs.gov
Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
Oleg SokolskyUniversity of PennsylvaniaVerified email at cis.upenn.edu
Michael RobkinHIT and Medical Device ExecutiveVerified email at mdpnp.org
Eleanor SayreKansas State UniversityVerified email at ksu.edu
Eric Chan-TinAssociate Professor of Cybersecurity, Loyola University ChicagoVerified email at cs.luc.edu
Andrew L KingUniversity of PennsylvaniaVerified email at cis.upenn.edu
George AmariucaiKansas State UniversityVerified email at ksu.edu
Qais TasaliGraduate Research/Teaching Assistant, Kansas State UniversityVerified email at ksu.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Gary BraseProfessor of Psychological Sciences, Kansas State UniversityVerified email at ksu.edu
Chandan ChowdhuryKansas State UniversityVerified email at ksu.edu