Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
- Dr. Joseph ConnorResearch Scientist, MetaVerified email at fb.com
- Sean OeschCybersecurity Researcher, Oak Ridge National LaboratoryVerified email at ornl.gov
- Robert A. BridgesResearch Mathematician, Oak Ridge National LaboratoryVerified email at ornl.gov
- Irfan AhmedVirginia Commonwealth UniversityVerified email at vcu.edu
- Brian WeberOak Ridge National LaboratoryVerified email at ornl.gov
- Berat ArikGeorgia TechVerified email at gatech.edu
- Justin M. BeaverDistinguished Research Fellow, Lirio LLCVerified email at lirio.com
- Michael IannaconeOak Ridge National LabVerified email at ornl.gov
- Miki VermaGraduate Student, Stanford UniversityVerified email at stanford.edu
- Bruce MacLennanUniversity of Tennessee, KnoxvilleVerified email at utk.edu
- Stacy ProwellComputer Science Department, Tennessee Technological UniversityVerified email at tntech.edu
- J. Bryan LylesVerified email at acm.org
- Rima Asmar AwadResearch EngineerVerified email at ornl.gov
- Jeremy HollemanAssociate Professor of Electrical and Computer Engineering; UNC CharlotteVerified email at uncc.edu
- Craig MilesOffensive Security Research, AmazonVerified email at craigmil.es
- Sushma KalleVerified email at ucumberlands.edu
- Syed Ali QasimGrand Valley State UniversityVerified email at gvsu.edu
- Audris MockusUniversity of TennesseeVerified email at mockus.org
- Daniel ScofieldAssured Information SecurityVerified email at dscofield.com