Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Paul AmmannAssociate Professor of Computer Science, George Mason UniversityVerified email at gmu.edu
- Phil WindleyAmazon Web ServicesVerified email at windley.org
- D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov
- Yan WuBowling Green State UniversityVerified email at bgsu.edu
- Mor Harchol-BalterBruce J. Nelson Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Lin DengTowson UniversityVerified email at towson.edu
- Bertrand STIVALETGuest ResearcherVerified email at nist.gov
- Dirk BeyerProfessor of Computer Science, LMU Munich, GermanyVerified email at lmu.de
- Karen ScarfonePrincipal Consultant, Scarfone CybersecurityVerified email at scarfonecybersecurity.com
- Wei Ding, Fellow of IEEEProfessor of Computer Science, University of Massachusetts BostonVerified email at umb.edu