Get my own profile
Public access
View all10 articles
14 articles
available
not available
Based on funding mandates
Co-authors
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
- Ritu ChadhaSenior Research Director, Peraton LabsVerified email at peratonlabs.com
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Shridatt SugrimRutgers UniversityVerified email at winlab.rutgers.edu
- Rauf IzmailovPeraton LabsVerified email at mail.peratonlabs.com
- Charles KamhouaDEVCOM Army Research Laboratory, Adversarial Resilient Cyber Methodology Team LeaderVerified email at army.mil
- Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
- C.Pandu RanganProfessor, Department of Computer Science and Engg, IIT-Madras, India.Verified email at cse.iitm.ac.in
- Mason WrightResearch Scientist, FacebookVerified email at umich.edu
- George CybenkoThayer School of Engineering at DartmouthVerified email at dartmouth.edu
- Norbou BuchlerU.S. Army DEVCOM Analysis Center - Networked Systems BranchVerified email at army.mil
- Hasan CamBest BuyVerified email at bestbuy.com
- Ermanno BattistaFervento srl | Ph.D. Department of Electrical Engineering and Information Technology, University ofVerified email at unina.it
- Mario BarbareschiTenured Assistant Professor | Dipartimento di Ingegneria Elettrica e delle Tecnologie dellVerified email at unina.it
- Kareem AminGoogleVerified email at google.com
- Michael WellmanProfessor of Computer Science & Engineering, University of MichiganVerified email at umich.edu
- Ankit ShahIndiana UniversityVerified email at iu.edu
- Rajesh GanesanGeorge Mason UniversityVerified email at gmu.edu
- Antonino MazzeoProfessore università di Napoli Federico IIVerified email at unina.it
- nicola mazzoccaUniversità di Napoli Federico IIVerified email at unina.it