Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Daniela RusAndrew (1956) and Erna Viterbi Professor of Computer Science, MITEmail verificata su csail.mit.edu
- Paul ThompsonProfessor of Neurology & Psychiatry, Imaging Genetics Center, USCEmail verificata su usc.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- Javed AslamProfessor, Khoury College of Computer Sciences, Northeastern UniversityEmail verificata su ccs.neu.edu
- Florin ConstantinGoogle Inc, CAEmail verificata su eecs.harvard.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityEmail verificata su gmu.edu
- Michael WellmanProfessor of Computer Science & Engineering, University of MichiganEmail verificata su umich.edu
- Sridhar VenkatesanPeraton LabsEmail verificata su peratonlabs.com
- Diego HernandoAssociate Professor, University of Wisconsin-MadisonEmail verificata su wisc.edu
- Jim HendlerProfessor of computer science, RPIEmail verificata su cs.rpi.edu
- Charles Van LoanCornell UniversityEmail verificata su cs.cornell.edu
- John MurphyTenet3, LLCEmail verificata su dartmouth.edu
- Daniel Yaacov BilarEmail verificata su pm.me
- Francis SullivanIDA Center for Computing SciencesEmail verificata su super.org
- Santiago Aja FernandezLPI, Universidad de ValladolidEmail verificata su tel.uva.es
- Carlos Alberola LópezCatedrático de la Universidad de ValladolidEmail verificata su tel.uva.es
- Carl E. LandwehrUniversity of Michigan, George Washington University and Independent ConsultantEmail verificata su gwu.edu
- Alan S. WillskyProfessor of EECS, MITEmail verificata su mit.edu
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeEmail verificata su dartmouth.edu