Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
James H. AndersonKenan Professor of Computer Science, The University of North Carolina at Chapel HillVerified email at cs.unc.edu
Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
Christopher J. KennaUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
Glenn A. ElliottUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
Namhoon KimMicrosoftVerified email at microsoft.com
Samuel JeroSystems Security Researcher, MIT Lincoln LaboratoryVerified email at ll.mit.edu
Luiz Felipe PerroneDepartment of Computer Science, Bucknell UniversityVerified email at bucknell.edu
F. Donelson SmithResearch Professor of Computer Science, University of North Carolina at Chapel HillVerified email at cs.unc.edu
Nathan BurowMIT Lincoln LaboratoryVerified email at ll.mit.edu
Sanjoy BaruahWashington University in Saint LouisVerified email at wustl.edu
Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryVerified email at ll.mit.edu
Robert J. WallsWorcester Polytechnic InstituteVerified email at wpi.edu
Craig A. ShueProfessor and Department Head of Computer Science, Worcester Polytechnic InstituteVerified email at cs.wpi.edu
Ning ZhangWashington University in St. LouisVerified email at wustl.edu
Nathan OtternessUniverisity of North Carolina at Chapel HillVerified email at cs.unc.edu
Juliana FurgalaCybersecurity Researcher, MIT Lincoln LaboratoryVerified email at mit.edu
Cailani Lemieux-MackVanderbilt UniversityVerified email at vanderbilt.edu
Claudio CicconettiIIT-CNRVerified email at iit.cnr.it
GIOVANNI STEAUniversity of PisaVerified email at unipi.it
Zhishan GuoAssociate Professor at North Carolina State UniversityVerified email at ncsu.edu