Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
Xiaoyin WangProfessor, University of Texas at San AntonioVerified email at utsa.edu
Mitra Bokaei HosseiniAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Hanan HibshiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Smita GhaisasTata Consultancy Services ltd. TRDDCVerified email at tcs.com
Elena PetersonPacific Northwest National LaboratoryVerified email at pnnl.gov
Daniel M. BestSr. Cyber Security Researcher, PNNLVerified email at pnnl.gov
Jane Cleland-HuangUniversity of Notre DameVerified email at nd.edu
Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu