Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Xiaoyin WangAssociate Professor, University of Texas at San AntonioVerified email at utsa.edu
Joanne M. AtleeComputer Science, University of WaterlooVerified email at uwaterloo.ca
Nancy A. DayUniversity of WaterlooVerified email at uwaterloo.ca
Jaspreet BhatiaStaff Privacy Engineer, GoogleVerified email at cs.cmu.edu
Anupam JoshiOros Family Professor in Technology, CSEE Department, UMBCVerified email at umbc.edu
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Tim FininUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
Lalana KagalMassachusetts Institute of TechnologyVerified email at csail.mit.edu
Omar Haider ChowdhuryAssociate Professor of CS at Stony Brook UniversityVerified email at cs.stonybrook.edu
Jeffery von RonneAssociate Professor of Computer Science, The University of Texas at San AntonioVerified email at utsa.edu
Jonathan ShahenGraduate Student in Computer Engineering, Waterloo UniversityVerified email at uwaterloo.ca
Mahesh TripunitaraProfessor, University of WaterlooVerified email at uwaterloo.ca
Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
Keith IrwinProfessor of Computer Science, Winston-Salem State UniversityVerified email at wssu.edu