Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
Michael JacobsGeorge Mason UniversityVerified email at iongroup.com
Eric RobertsonPAR GovernmentVerified email at partech.com
Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
Eric T. HarleyHarley Labs, LLCVerified email at ericharley.com
Vijay V RaghavanAlfred and Helen Lamson Endowed Professor in Computer Science, University of Louisiana at LafayetteVerified email at louisiana.edu
Cheehung henry ChuUniversity of Louisiana at LafayetteVerified email at louisiana.edu
Vipin SwarupThe MITRE CorporationVerified email at mitre.org
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Matthew ElderJohns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
Ingrid DaubechiesDuke UniversityVerified email at math.duke.edu
Pierre TrepagnierVerified email at ll.mit.edu
James CurboJohns Hopkins UniversityVerified email at jhu.edu
Alexander KottUS Army Research LaboratoryVerified email at army.mil
Luis Muñoz-GonzálezSenior Research Scientist, Telefónica ResearchVerified email at telefonica.com
Diane S. HenshelO'Neill School of Public and Environmental Affairs, Indiana UniversityVerified email at indiana.edu
Igor LinkovUS Army Corps of EngineersVerified email at usace.army.mil
Lynn KeuthanThe George Washington UniversityVerified email at gwu.edu
Kevin B JacobsDELFI DiagnosticsVerified email at bioinformed.com
Follow