Get my own profile
Public access
View all21 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Constantinos KoliasAssociate Professor, University of IdahoVerified email at uidaho.edu
Alireza FamiliPh.D. in Electrical Engineering, Virginia TechVerified email at vt.edu
Jeffrey VoasComputer Scientist, NISTVerified email at ieee.org
Dan FleckProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Gabriela (Cretu) CiocarlieAssociate Professor at The University of Texas at San AntonioVerified email at cs.columbia.edu
Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Dan RubensteinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Mohamed ElsabaghQuokkaVerified email at quokka.io
Tolga AtalayA2 LabsVerified email at a2labs.com
Ryan JohnsonGeorge Mason UniversityVerified email at masonlive.gmu.edu
Rahul MurmuriaSensor Tower Inc. | Kryptowire LLC | George Mason UniversityVerified email at gmu.edu
Quan JiaGeorge Mason UniversityVerified email at gmu.edu
Jason NiehColumbia UniversityVerified email at cs.columbia.edu
Charles SmutzSandia National LaboratoriesVerified email at sandia.gov