Get my own profile
Public access
View all11 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Yu LeiUniversity of Texas at ArlingtonVerified email at cse.uta.edu
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
Vincent C. HuNISTVerified email at nist.gov
Jeffrey VoasComputer Scientist, NISTVerified email at ieee.org
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.gov
Linbin YuFacebookVerified email at mavs.uta.edu
Laleh GhandehariUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Timothy WeilIEEE Computer/Communication SocietiesVerified email at securityfeeds.com
Thomas J. WalshSony AIVerified email at sony.com
Feng DuanUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Tao XiePeking University Chair Professor, Chair of Department of Software Science and Engineering@PKUVerified email at pku.edu.cn
Doug MontgomeryManager, Internet and Scalable Systems Research, NISTVerified email at nist.gov
Renee BryceUniversity of North TexasVerified email at unt.edu
Dr. Kotikalapudi SriramNational Institute of Standards and TechnologyVerified email at nist.gov
Paul E. BlackNISTVerified email at nist.gov
Mehra N. BorazjanyPh.D Computer Science, University of Texas at ArlingtonVerified email at mavs.uta.edu
Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
Constantinos KoliasAssociate Professor, University of IdahoVerified email at uidaho.edu
Jacek CzerwonkaMicrosoft Corp.Verified email at microsoft.com
Follow![D. Richard (Rick) Kuhn](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=1ZdBywEAAAAJ&citpid=3)
D. Richard (Rick) Kuhn
Computer scientist, National Institute of Standards and Technology (NIST)
Verified email at nist.gov - Homepage