Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- David GrawrockTwentySeven34Verified email at twentyseven34.com
- Marcello BalducciniDecision and System Sciences, Saint Joseph's UniversityVerified email at sju.edu
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
- David A. WollmanDeputy Division Chief, Smart Connected Systems Division, Communications Technology Laboratory, NISTVerified email at nist.gov
- Andrew WhinstonUniversity of Texas at AustinVerified email at uts.cc.utexas.edu
- Suresh K. DamodaranMITRE CorporationVerified email at acm.org
- Rajarshi ChakrabortyGraduate Assistant, University at BuffaloVerified email at buffalo.edu
- Frederick T. SheldonProfessorVerified email at uidaho.edu
- Marcin WójcikVerified email at cam.ac.uk
- Roel MaesSynopsysVerified email at synopsys.com
- Wei WuIntelVerified email at intel.com
- Ghassan KarameProfessor of Computer Science, Ruhr Universität Bochum (RUB)Verified email at rub.de
- Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
- Louis MarinosBornemouth UniversityVerified email at enisa.europa.eu
- Simon P. JohnsonIntelVerified email at intel.com
- Jeff SedayaoIntel CorporationVerified email at intel.com
- Fred ChongSeymour Goodman Professor, UChicago; and Chief Scientist for Quantum Software, InfleqtionVerified email at cs.uchicago.edu
- Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Christian W ProbstUnitec Institute of TechnologyVerified email at unitec.ac.nz