Get my own profile
Public access
View all67 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
Jaehong ParkUniversity of Alabama in HuntsvilleVerified email at uah.edu
Xinwen ZhangHiretualVerified email at hiretual.com
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Maanak GuptaAssistant Professor, Tennessee Technological UniversityVerified email at tntech.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
Smriti BhattPurdue UniversityVerified email at purdue.edu
Yuan ChengCalifornia State University, SacramentoVerified email at csus.edu
Khalid BijonSnowflakeVerified email at snowflake.com
Xin JinSoftware Engineer @ ConfluentVerified email at confluent.io
James BensonUniversity of Texas at San AntonioVerified email at utsa.edu