Get my own profile
Public access
View all20 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
- Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
- Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
- Constantinos KoliasAssistant Professor, University of IdahoVerified email at uidaho.edu
- Jeffrey VoasComputer Scientist, NISTVerified email at ieee.org
- Kun SunGeorge Mason UniversityVerified email at gmu.edu
- Dan FleckProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Gabriela (Cretu) CiocarlieAssociate Professor at The University of Texas at San AntonioVerified email at cs.columbia.edu
- Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
- Alireza FamiliPhD CandidateVerified email at vt.edu
- Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
- Dan RubensteinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
- Mohamed ElsabaghKryptowireVerified email at kryptowire.com
- Ryan JohnsonGeorge Mason UniversityVerified email at masonlive.gmu.edu
- Rahul MurmuriaSensor Tower Inc. | Kryptowire LLC | George Mason UniversityVerified email at gmu.edu
- Quan JiaGeorge Mason UniversityVerified email at gmu.edu
- Jason NiehColumbia UniversityVerified email at cs.columbia.edu
- Charles SmutzSandia National LaboratoriesVerified email at sandia.gov
- Daniel BarbaraProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu