Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eugene H. SpaffordProfessor, Purdue UniversityVerified email at purdue.edu
Robert C. MillerProfessor, Computer Science, MITVerified email at mit.edu
Alan SchwartzProfessor of Medical Education and Research Professor of Pediatrics, University of Illinois at ChicagoVerified email at uic.edu
John M. AbowdEdmund Ezra Day Professor Emeritus, Cornell University; U.S. Census Bureau (retired)Verified email at cornell.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Vassil RoussevProfessor of Computer Science, University of New OrleansVerified email at cs.uno.edu
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Daniel KiferPenn State UniversityVerified email at cse.psu.edu
Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
Christian StranskyKKH Kaufmännische KrankenkasseVerified email at sec.uni-hannover.de
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Ravi PappuApeiron Labs, Inc.Verified email at alum.mit.edu
Joel YoungHireguide - Chief Technology OfficerVerified email at hireguide.com
Kevin D. FairbanksPrincipal Cyber Operations Engineer, MITREVerified email at fairbanksphd.com
David J. MalanHarvard UniversityVerified email at harvard.edu
Kam WoodsResearch Scientist, UNC Chapel HillVerified email at email.unc.edu
Alex J. NelsonUniversity of California, Santa CruzVerified email at cs.ucsc.edu
Robert BeverlyProfessor of Computer Science, San Diego State UniversityVerified email at sdsu.edu