Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
- Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- John HatcliffUniversity Distinguished Professor, Department of Computing and Information Sciences, Kansas StateVerified email at ksu.edu
- Denis Foo KuneAmazon Web ServicesVerified email at amazon.com
- David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
- Julian M GoldmanMassachusetts General HospitalVerified email at mgh.harvard.edu
- Sandy WeiningerUS FDAVerified email at fda.hhs.gov
- Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
- Oleg SokolskyUniversity of PennsylvaniaVerified email at cis.upenn.edu
- Michael RobkinHIT and Medical Device ExecutiveVerified email at mdpnp.org
- Eleanor SayreKansas State UniversityVerified email at ksu.edu
- Eric Chan-TinAssociate Professor of Cybersecurity, Loyola University ChicagoVerified email at cs.luc.edu
- Andrew L KingUniversity of PennsylvaniaVerified email at cis.upenn.edu
- George AmariucaiKansas State UniversityVerified email at ksu.edu
- Qais TasaliGraduate Research/Teaching Assistant, Kansas State UniversityVerified email at ksu.edu
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Chandan ChowdhuryKansas State UniversityVerified email at ksu.edu
- Gary BraseProfessor of Psychological Sciences, Kansas State UniversityVerified email at ksu.edu
- Pascal HitzlerLloyd T. Smith Creativity in Engineering Chair, Kansas State University, Manhattan, KansasVerified email at ksu.edu