Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
Joanne M. AtleeComputer Science, University of WaterlooVerified email at uwaterloo.ca
Nancy A. DayUniversity of WaterlooVerified email at uwaterloo.ca
Xiaoyin WangAssociate Professor, University of Texas at San AntonioVerified email at utsa.edu
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
Anupam JoshiOros Family Professor in Technology, CSEE Department, UMBCVerified email at umbc.edu
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Tim FininWillard and Lillian Hackerman Chair in Engineering, University of Maryland, Baltimore CountyVerified email at umbc.edu
Lalana KagalMassachusetts Institute of TechnologyVerified email at csail.mit.edu
Omar Haider ChowdhuryAssistant Professor at University of IowaVerified email at uiowa.edu
Jaspreet BhatiaPrivacy Engineer, GoogleVerified email at cs.cmu.edu
Jeffery von RonneAssociate Professor of Computer Science, The University of Texas at San AntonioVerified email at utsa.edu
Jonathan ShahenGraduate Student in Computer Engineering, Waterloo UniversityVerified email at uwaterloo.ca
Mahesh TripunitaraProfessor, University of WaterlooVerified email at uwaterloo.ca
Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
Limin JiaCarnegie Mellon UniversityVerified email at cmu.edu
Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
