Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
- Sara RampazziUniversity of FloridaVerified email at ufl.edu
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at lbl.gov
- Sophie EngleProfessor of Computer Science, University of San FranciscoVerified email at cs.usfca.edu
- Leon OsterweilUniversity of Massachusetts AmherstVerified email at cs.umass.edu
- Lori ClarkeProfessor of Computer Science, University of Massachusetts AmherstVerified email at cs.umass.edu
- Borislava I. SimidchievaRaytheon BBNVerified email at bbn.com
- Nidhi RastogiAssistant Professor, Rochester Institute of Technology, NYVerified email at rit.edu
- Alfred ChenAssistant Professor, University of California, IrvineVerified email at uci.edu
- Takami SatoUniversity of California, IrvineVerified email at uci.edu
- Takeshi SugawaraThe University of Electro-CommunicationsVerified email at uec.ac.jp
- Sri Hrushikesh Varma BhupathirajuUniversity of FloridaVerified email at ufl.edu
- Dipkamal BhusalRochester Institute of TechnologyVerified email at rit.edu
- Miriam HellerMHITech SystemsVerified email at mhitech.com
- Monish Kumar Manikya Veerabhadranrochester institute of technologyVerified email at g.rit.edu
- Tina Eliassi-RadProfessor & President Joseph E. Aoun Chair, Northeastern UniversityVerified email at eliassi.org
- Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu