Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
David ChoffnesAssociate Professor, Northeastern UniversityVerified email at ccs.neu.edu
Alan MisloveProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
Bryan C. WardVanderbilt UniversityVerified email at vanderbilt.edu
Arash Molavi KakhkiThousandEyesVerified email at thousandeyes.com
Benjamin E. UjcichGeorgetown UniversityVerified email at georgetown.edu
Adam BatesAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
William H SandersCarnegie Mellon UniversityVerified email at cmu.edu
Endadul HoqueSyracuse UniversityVerified email at syr.edu
Juliana FurgalaCybersecurity Researcher, MIT Lincoln LaboratoryVerified email at mit.edu
Nathan BurowMIT Lincoln LaboratoryVerified email at ll.mit.edu
Matthew JagielskiGoogle DeepMindVerified email at google.com
Shawn OstermannSenior Associate Dean, Russ College of Engineering and Technology, Ohio UniversityVerified email at ohio.edu
Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryVerified email at ll.mit.edu
Anne EdmundsonPrinceton UniversityVerified email at alumni.princeton.edu
Hyojeong LeePurdue UniversityVerified email at purdue.edu
Dan GoldwasserPurdue UniversityVerified email at purdue.edu
Maria Leonor PachecoAssistant Professor, University of Colorado BoulderVerified email at colorado.edu