Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ethan Katz-BassettAssociate Professor, Columbia UniversityVerified email at columbia.edu
Matt CalderMeta, Columbia UniversityVerified email at meta.com
Ítalo CunhaUniversidade Federal de Minas GeraisVerified email at dcc.ufmg.br
Giotsas VasileiosLancaster UniversityVerified email at lancaster.ac.uk
Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
Gregory ContiPrincipal, Kopidion CybersecurityVerified email at usma.edu
Jan Kallberg, Ph.D.Senior Fellow, Center for European Policy Analysis, adj. NYU and GWU, CyberDefense.com, former USMAVerified email at cyberdefense.com
Weifan JiangPhD student in Computer Science, Harvard UniversityVerified email at g.harvard.edu
Brandon SchlinkerFacebookVerified email at inbound5.com
Rob HarrisonAssociate Professor, United States Military AcademyVerified email at westpoint.edu
Arpit GuptaAssistant Professor, UC Santa BarbaraVerified email at cs.ucsb.edu
Yang ZhangNormalyze.aiVerified email at cse.psu.edu
Wyatt LloydAssociate Professor of Computer Science, Princeton UniversityVerified email at princeton.edu
David RaymondVirginia TechVerified email at vt.edu
Ege GurmericlilerColumbia University, Two Sigma Investments LPVerified email at columbia.edu
Harsha MadhyasthaAssociate Professor of Computer Science, USCVerified email at usc.edu
Michael SchapiraProfessor of Computer Science, The Hebrew University of JerusalemVerified email at huji.ac.il
Paul MaxwellArmy Cyber InstituteVerified email at westpoint.edu
Geoff StokerUNCWVerified email at uncw.edu
Thomas S. CookProfessor of Computer Science, United States Military AcademyVerified email at usma.edu