Get my own profile
Public access
View all77 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
Jaehong ParkUniversity of Alabama in HuntsvilleVerified email at uah.edu
Maanak GuptaAssociate Professor, Tennessee Tech UniversityVerified email at tntech.edu
Xinwen ZhangHiretualVerified email at hiretual.com
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Smriti BhattPurdue UniversityVerified email at purdue.edu
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
James BensonUniversity of Texas at San AntonioVerified email at utsa.edu
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
Yuan ChengGrand Valley State UniversityVerified email at gvsu.edu
Khalid BijonSnowflakeVerified email at snowflake.com
Mahmoud AbdelsalamAssistant Professor, North Carolina A&T State UniversityVerified email at ncat.edu
Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.gov