Get my own profile
Public access
View all77 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
- Jaehong ParkUniversity of Alabama in HuntsvilleVerified email at uah.edu
- Maanak GuptaAssociate Professor, Tennessee Tech UniversityVerified email at tntech.edu
- Xinwen ZhangHiretualVerified email at hiretual.com
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov
- Gail-Joon AhnArizona State UniversityVerified email at asu.edu
- Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
- Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
- Smriti BhattPurdue UniversityVerified email at purdue.edu
- James BensonUniversity of Texas at San AntonioVerified email at utsa.edu
- Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
- Yuan ChengGrand Valley State UniversityVerified email at gvsu.edu
- Khalid BijonSnowflakeVerified email at snowflake.com
- Xin JinSoftware Engineer @ ConfluentVerified email at confluent.io
- Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.gov