Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Igor LinkovUS Army Corps of EngineersVerified email at usace.army.mil
Edward J. M. Colbert, Ph.D.Virginia TechVerified email at ecolbert.com
Jeffrey M. KeislerUniversity of Massachusetts BostonVerified email at umb.edu
Alberts DavidSenior Fellow IDA - President IC2IVerified email at internationalc2institute.org
cliff wangNCSUVerified email at ncsu.edu
Martin DrašarInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
Alexander A. GaninUniversity of VirginiaVerified email at virginia.edu
Benoît LeBlancEnseignant/Chercheur à l'Ecole Nationale Supérieure de Cognitique (Bordeaux INP)Verified email at ensc.fr
Krzysztof RzadcaInstitute of Informatics, University of Warsaw and GoogleVerified email at mimuw.edu.pl
Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
Mauno PihelgasSenior Security ResearcherVerified email at pihelgas.eu
Rami S MangoubiC.S. Draper LaboratoryVerified email at draper.com
Thomas P SeagerAssociate Professor of Sustainable Engineering, Arizona State UniversityVerified email at asu.edu
Prof. Alexander GutfraindAmazon, Loyola University ChicagoVerified email at cornell.edu
Emanuele MassaroEuropean Commission, Joint Research CentreVerified email at ec.europa.eu
Kenneth D. ForbusProfessor of Computer Science, Northwestern UniversityVerified email at northwestern.edu
Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Fernando MaymiIronNet Cybersecurity, Inc.Verified email at maymi.net