Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
James H. AndersonKenan Professor of Computer Science, The University of North Carolina at Chapel HillVerified email at cs.unc.edu
Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
Christopher J. KennaUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
Glenn A. ElliottUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
Namhoon KimMicrosoftVerified email at microsoft.com
Luiz Felipe PerroneDepartment of Computer Science, Bucknell UniversityVerified email at bucknell.edu
Samuel JeroSystems Security Researcher, MIT Lincoln LaboratoryVerified email at ll.mit.edu
Nathan BurowMIT Lincoln LaboratoryVerified email at ll.mit.edu
Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryVerified email at ll.mit.edu
Sanjoy BaruahWashington University in Saint LouisVerified email at wustl.edu
Robert J. WallsWorcester Polytechnic InstituteVerified email at wpi.edu
Craig A. ShueProfessor and Department Head of Computer Science, Worcester Polytechnic InstituteVerified email at cs.wpi.edu
Claudio CicconettiIIT-CNRVerified email at iit.cnr.it
Zhishan GuoAssociate Professor at North Carolina State UniversityVerified email at ncsu.edu
Shai CaspinGraduate Student, Princeton UniversityVerified email at princeton.edu
Abhilash ThekkilakattilScania, SwedenVerified email at scania.com
Chad SpenskyCEO, AllthenticateVerified email at allthenticate.net
Ryan BurrowMIT Lincoln LaboratoryVerified email at ll.mit.edu
Nathan RyanProfessor of Mathematics, Bucknell UniversityVerified email at bucknell.edu
Samuel MergendahlMIT Lincoln LaboratoryVerified email at ll.mit.edu