Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
Sara RampazziUniversity of FloridaVerified email at ufl.edu
Alfred ChenAssistant Professor, University of California, IrvineVerified email at uci.edu
Takami SatoKeio UniversityVerified email at uci.edu
Takeshi SugawaraThe University of Electro-CommunicationsVerified email at uec.ac.jp
Sri Hrushikesh Varma BhupathirajuUniversity of FloridaVerified email at ufl.edu
Nidhi RastogiAssistant Professor, Rochester Institute of Technology, NYVerified email at rit.edu
Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at lbl.gov
Sophie EngleProfessor of Computer Science, University of San FranciscoVerified email at cs.usfca.edu
Leon OsterweilUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Lori ClarkeProfessor of Computer Science, University of Massachusetts AmherstVerified email at cs.umass.edu
Borislava I. SimidchievaRaytheon BBNVerified email at bbn.com
Dipkamal BhusalRochester Institute of TechnologyVerified email at rit.edu
Monish Kumar Manikya Veerabhadranrochester institute of technologyVerified email at g.rit.edu
Miriam HellerMHITech SystemsVerified email at mhitech.com
Tina Eliassi-RadProfessor & The Inaugural Joseph E. Aoun Chair, Northeastern UniversityVerified email at eliassi.org
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Sidney La FontaineNortheastern UniversityVerified email at northeastern.edu
Md Tanvirul AlamPhD Student, Rochester Institute of TechnologyVerified email at mail.rit.edu