Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
David GrawrockTwentySeven34Verified email at twentyseven34.com
Marcello BalducciniDecision and System Sciences, Saint Joseph's UniversityVerified email at sju.edu
H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
David A. WollmanDeputy Division Chief, Smart Connected Systems Division, Communications Technology Laboratory, NISTVerified email at nist.gov
Andrew WhinstonUniversity of Texas at AustinVerified email at uts.cc.utexas.edu
Suresh K. DamodaranMITRE CorporationVerified email at acm.org
Rajarshi ChakrabortyGraduate Assistant, University at BuffaloVerified email at buffalo.edu
Frederick T. SheldonProfessorVerified email at uidaho.edu
Marcin WójcikVerified email at cam.ac.uk
Roel MaesSynopsysVerified email at synopsys.com
Wei WuIntelVerified email at intel.com
Ghassan KarameProfessor of Computer Science, Ruhr Universität Bochum (RUB)Verified email at rub.de
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
Louis MarinosBornemouth UniversityVerified email at enisa.europa.eu
Simon P. JohnsonIntelVerified email at intel.com
Jeff SedayaoIntel CorporationVerified email at intel.com
Fred ChongSeymour Goodman Professor, UChicago; and Chief Scientist for Quantum Software, InfleqtionVerified email at cs.uchicago.edu
Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Christian W ProbstUnitec Institute of TechnologyVerified email at unitec.ac.nz