Get my own profile
Public access
View all46 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jana ShakarianAssistant Research Technologist, ASUVerified email at asu.edu
Eric NunesInformation Security @PayPal, Arizona State UniversityVerified email at asu.edu
Mohammed AlmukayniziAssistant Professor at King Saud UniversityVerified email at asu.edu
Gerardo I. SimariDepartment of Computer Science and Engineering, Universidad Nacional del Sur and CONICET, ArgentinaVerified email at cs.uns.edu.ar
Elham ShaabaniWalmart LabsVerified email at asu.edu
Ericsson MarinAssistant Professor California State Polytechnic University, PomonaVerified email at cpp.edu
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Hamidreza AlvariGoogle ResearchVerified email at google.com
Ruocheng GuoBytedance Research, LondonVerified email at bytedance.com
Andrew RuefVerified email at mimisbrunnr.net
Soumajyoti SarkarML Researcher, AWS AIVerified email at asu.edu
Patrick RoosPrincipal Data Scientist at Miner & KaschVerified email at cs.umd.edu
Kristina LermanUSC Information Sciences InstituteVerified email at isi.edu
Marcelo A. FalappaProfessor of Computer Science, Universidad Nacional del Sur, CONICET, ArgentinaVerified email at cs.uns.edu.ar
Anthony N. JohnsonChief Scientist, Johns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
Christian LebiereResearch Faculty, Psychology Department, Carnegie Mellon UniversityVerified email at cmu.edu
Robert H ThomsonUnited States Military AcademyVerified email at westpoint.edu
Simon ParsonsUniversity of Lincoln, School of Computer ScienceVerified email at lincoln.ac.uk
Devon CallahanAssistant Professor, United States Military Academy, West PointVerified email at westpoint.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu