Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Guodong ShaoNational Institute of Standards and TechnologyVerified email at nist.gov
- Daniel MenasceProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
- X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Juan LuoGeorge Mason UniversityVerified email at gmu.edu
- Mohan KrishnamoorthyRMIT UniversityVerified email at rmit.edu.au
- lei zhangThomson ReutersVerified email at thomsonreuters.com
- Malak Talal Al-NoryEffat University and Massachusetts Institute of TechnologyVerified email at effatuniversity.edu.sa
- Mohamad Omar Nachawati, PhDResearch Software EngineerVerified email at gmu.edu
- Csilla FarkasAssociate Professor of Computer Science and Engineering, South Carolina UniveristyVerified email at cec.sc.edu
- Chun-Kit NganWorcester Polytechnic Institute, Data Science ProgramVerified email at wpi.edu
- Michael MaherReasoning Research InstituteVerified email at reasoning.org.au
- Duck Bong KimTennessee Technological UniversityVerified email at tntech.edu
- Claudio BettiniUniversità degli Studi di MilanoVerified email at unimi.it
- William "Bill" Z. Bernstein, PhDAir Force Research LaboratoryVerified email at us.af.mil
- Jessica LinGeorge Mason UniversityVerified email at gmu.edu
- Hanan Abdullah MengashPrincess Nourah bint Abdulrahman University, College of Computer and Information Sciences, Dep. ofVerified email at pnu.edu.sa
- Susan FarleyPhD, George Mason UniversityVerified email at davefarley.org
- Joxan JaffarNational University of SingaporeVerified email at comp.nus.edu.sg
- Mohan KrishnamoorthyArgonne National LaboratoryVerified email at anl.gov
Follow
Alexander Brodsky
Professor, Department of Computer Science, George Mason University
Verified email at gmu.edu - Homepage