Get my own profile
Public access
View all7 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Yu LeiUniversity of Texas at ArlingtonVerified email at cse.uta.edu
- David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
- Vincent C. HuNISTVerified email at nist.gov
- Jeffrey VoasComputer Scientist, NISTVerified email at ieee.org
- Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
- Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.gov
- Linbin YuFacebookVerified email at mavs.uta.edu
- Laleh GhandehariUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
- Timothy WeilIEEE Computer/Communication SocietiesVerified email at securityfeeds.com
- Thomas J. WalshSony AIVerified email at sony.com
- Feng DuanUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
- Tao XiePeking University Chair Professor, Chair of Department of Software Science and Engineering@PKUVerified email at pku.edu.cn
- Doug MontgomeryManager, Internet and Scalable Systems Research, NISTVerified email at nist.gov
- Renee BryceUniversity of North TexasVerified email at unt.edu
- Dr. Kotikalapudi SriramNational Institute of Standards and TechnologyVerified email at nist.gov
- Paul E. BlackNISTVerified email at nist.gov
- Mehra N. BorazjanyPh.D Computer Science, University of Texas at ArlingtonVerified email at mavs.uta.edu
- Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
- Constantinos KoliasAssistant Professor, University of IdahoVerified email at uidaho.edu
- Jacek CzerwonkaMicrosoft Corp.Verified email at microsoft.com
Follow
D. Richard (Rick) Kuhn
Computer scientist, National Institute of Standards and Technology (NIST)
Verified email at nist.gov - Homepage