Get my own profile
Public access
View all14 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Daniela RusAndrew (1956) and Erna Viterbi Professor of Computer Science, MITVerified email at csail.mit.edu
Paul ThompsonProfessor of Neurology & Psychiatry, Imaging Genetics Center, USCVerified email at usc.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Javed AslamProfessor, Khoury College of Computer Sciences, Northeastern UniversityVerified email at ccs.neu.edu
Florin ConstantinGoogle Inc, CAVerified email at eecs.harvard.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
Michael WellmanProfessor of Computer Science & Engineering, University of MichiganVerified email at umich.edu
Sridhar VenkatesanPeraton LabsVerified email at peratonlabs.com
Diego HernandoAssociate Professor, University of Wisconsin-MadisonVerified email at wisc.edu
Jim HendlerProfessor of computer science, RPIVerified email at cs.rpi.edu
Charles Van LoanCornell UniversityVerified email at cs.cornell.edu
John MurphyTenet3, LLCVerified email at dartmouth.edu
Daniel Yaacov BilarVerified email at pm.me
Francis SullivanIDA Center for Computing SciencesVerified email at super.org
Santiago Aja FernandezLPI, Universidad de ValladolidVerified email at tel.uva.es
Carlos Alberola LópezCatedrático de la Universidad de ValladolidVerified email at tel.uva.es
Carl E. LandwehrUniversity of Michigan, George Washington University and Independent ConsultantVerified email at umich.edu
Alan S. WillskyProfessor of EECS, MITVerified email at mit.edu
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu