Get my own profile
Co-authors
Jaehong ParkUniversity of Alabama in HuntsvilleVerified email at uah.edu
Xinwen ZhangHiretualVerified email at hiretual.com
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
Yuan ChengCalifornia State University, SacramentoVerified email at csus.edu
Khalid BijonSnowflakeVerified email at snowflake.com
Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.gov
Xin JinSoftware Engineer @ ConfluentVerified email at confluent.io
Dang NguyenAmazon Web ServicesVerified email at my.utsa.edu
Paul AmmannAssociate Professor of Computer Science, George Mason UniversityVerified email at gmu.edu
Ravi Sandhu
Verified email at utsa.edu - Homepage