Get my own profile
Public access
View all19 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Constantinos KoliasUniversity of IdahoVerified email at uidaho.edu
Jeffrey VoasComputer Scientist, NISTVerified email at ieee.org
Kun SunGeorge Mason UniversityVerified email at gmu.edu
Dan FleckProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Gabriela (Cretu) CiocarlieAssociate Professor at The University of Texas at San AntonioVerified email at cs.columbia.edu
Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Dan RubensteinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Mohamed ElsabaghKryptowireVerified email at kryptowire.com
Rahul MurmuriaSensor Tower Inc. | Kryptowire LLC | George Mason UniversityVerified email at gmu.edu
Ryan JohnsonGeorge Mason UniversityVerified email at masonlive.gmu.edu
Quan JiaGeorge Mason UniversityVerified email at gmu.edu
Jason NiehColumbia UniversityVerified email at cs.columbia.edu
Charles SmutzSandia National LaboratoriesVerified email at sandia.gov
Vishal MisraColumbia UniversityVerified email at cs.columbia.edu
Daniel BarbaraProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu