Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Igor LinkovUS Army Corps of EngineersVerified email at usace.army.mil
- Edward J. M. Colbert, Ph.D.Virginia TechVerified email at ecolbert.com
- Jeffrey M. KeislerUniversity of Massachusetts BostonVerified email at umb.edu
- Alberts DavidSenior Fellow IDA - President IC2IVerified email at internationalc2institute.org
- Martin DrašarInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
- cliff wangNCSUVerified email at ncsu.edu
- Benoît LeBlancEnseignant/Chercheur à l'Ecole Nationale Supérieure de Cognitique (Bordeaux INP)Verified email at ensc.fr
- Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
- Alexander A. GaninUniversity of VirginiaVerified email at virginia.edu
- Krzysztof RzadcaInstitute of Informatics, University of Warsaw and GoogleVerified email at mimuw.edu.pl
- Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
- Mauno PihelgasSenior Security ResearcherVerified email at pihelgas.eu
- Rami S MangoubiC.S. Draper LaboratoryVerified email at draper.com
- Thomas P SeagerAssociate Professor of Sustainable Engineering, Arizona State UniversityVerified email at asu.edu
- Prof. Alexander GutfraindAmazon, Loyola University ChicagoVerified email at cornell.edu
- Emanuele MassaroEuropean Commission, Joint Research CentreVerified email at ec.europa.eu
- Kenneth D. ForbusProfessor of Computer Science, Northwestern UniversityVerified email at northwestern.edu
- Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
- Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
- Fernando MaymiIronNet Cybersecurity, Inc.Verified email at maymi.net