Get my own profile
Public access
View all12 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Daniela RusAndrew (1956) and Erna Viterbi Professor of Computer Science, MITVerified email at csail.mit.edu
Paul ThompsonProfessor of Neurology & Psychiatry, Imaging Genetics Center, USCVerified email at usc.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Javed AslamProfessor, Khoury College of Computer Sciences, Northeastern UniversityVerified email at ccs.neu.edu
Florin ConstantinGoogle Inc, CAVerified email at eecs.harvard.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Michael WellmanProfessor of Computer Science & Engineering, University of MichiganVerified email at umich.edu
Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
Charles Van LoanCornell UniversityVerified email at cs.cornell.edu
Diego HernandoAssociate Professor, University of Wisconsin-MadisonVerified email at wisc.edu
Sridhar VenkatesanPeraton LabsVerified email at peratonlabs.com
Jim HendlerProfessor of computer science, RPIVerified email at cs.rpi.edu
John MurphyThayer School of Engineering, Dartmouth CollegeVerified email at dartmouth.edu
Daniel Yaacov BilarVerified email at pm.me
Francis SullivanIDA Center for Computing SciencesVerified email at super.org
Santiago Aja FernandezLPI, Universidad de ValladolidVerified email at tel.uva.es
Carlos Alberola LópezCatedrático de la Universidad de ValladolidVerified email at tel.uva.es
Alan S. WillskyProfessor of EECS, MITVerified email at mit.edu
Carl E. LandwehrUniversity of Michigan, George Washington University and Independent ConsultantVerified email at gwu.edu
Massimo SantiniAssistant Professor of Computer Science, University of Milano, ItalyVerified email at unimi.it