Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
- Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
- Xiaoyin WangProfessor, University of Texas at San AntonioVerified email at utsa.edu
- Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
- Joanne M. AtleeComputer Science, University of WaterlooVerified email at uwaterloo.ca
- Nancy A. DayUniversity of WaterlooVerified email at uwaterloo.ca
- Jaspreet BhatiaStaff Privacy Engineer, GoogleVerified email at cs.cmu.edu
- Anupam JoshiOros Family Professor in Technology, CSEE Department, UMBCVerified email at umbc.edu
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- Tim FininUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
- Lalana KagalMassachusetts Institute of TechnologyVerified email at csail.mit.edu
- Omar Haider ChowdhuryAssociate Professor of CS at Stony Brook UniversityVerified email at cs.stonybrook.edu
- Jeffery von RonneAssociate Professor of Computer Science, The University of Texas at San AntonioVerified email at utsa.edu
- Jonathan ShahenGraduate Student in Computer Engineering, Waterloo UniversityVerified email at uwaterloo.ca
- Mahesh TripunitaraProfessor, University of WaterlooVerified email at uwaterloo.ca
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
- Keith IrwinProfessor of Computer Science, Winston-Salem State UniversityVerified email at wssu.edu