Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ethan Katz-BassettAssociate Professor, Columbia UniversityVerified email at columbia.edu
- Matt CalderMeta, Columbia UniversityVerified email at meta.com
- Ítalo CunhaUniversidade Federal de Minas GeraisVerified email at dcc.ufmg.br
- Giotsas VasileiosLancaster UniversityVerified email at lancaster.ac.uk
- Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
- Gregory ContiPrincipal, Kopidion CybersecurityVerified email at usma.edu
- Brandon SchlinkerFacebookVerified email at inbound5.com
- Weifan JiangPhD student in Computer Science, Harvard UniversityVerified email at g.harvard.edu
- Jan Kallberg, Ph.D.Senior Fellow, Center for European Policy Analysis, adj. NYU and GWU, CyberDefense.com, former USMAVerified email at cyberdefense.com
- Arpit GuptaAssistant Professor, UC Santa BarbaraVerified email at cs.ucsb.edu
- Rob HarrisonAssociate Professor, United States Military AcademyVerified email at westpoint.edu
- Yang ZhangNormalyze.aiVerified email at cse.psu.edu
- Wyatt LloydAssociate Professor of Computer Science, Princeton UniversityVerified email at princeton.edu
- David RaymondVirginia TechVerified email at vt.edu
- Ege GurmericlilerColumbia University, Two Sigma Investments LPVerified email at columbia.edu
- Harsha MadhyasthaAssociate Professor of Computer Science, USCVerified email at usc.edu
- Michael SchapiraProfessor of Computer Science, The Hebrew University of JerusalemVerified email at huji.ac.il
- Loqman SalamatianColumbia UniversityVerified email at columbia.edu
- Paul MaxwellArmy Cyber InstituteVerified email at westpoint.edu
- Geoff StokerUNCWVerified email at uncw.edu