Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yu LeiUniversity of Texas at ArlingtonEmail verificata su cse.uta.edu
- David FerraioloManager, Secure Systems & Applications Group, NIST Email verificata su nist.gov
- Vincent C. HuNISTEmail verificata su nist.gov
- Jeffrey VoasComputer Scientist, NISTEmail verificata su ieee.org
- Ravi SandhuUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTEmail verificata su nist.gov
- Linbin YuFacebookEmail verificata su mavs.uta.edu
- Laleh GhandehariUniversity of Texas at ArlingtonEmail verificata su mavs.uta.edu
- Timothy WeilIEEE Computer/Communication SocietiesEmail verificata su securityfeeds.com
- Thomas J. WalshSony AIEmail verificata su sony.com
- Feng DuanUniversity of Texas at ArlingtonEmail verificata su mavs.uta.edu
- Tao XiePeking University Chair Professor, Chair of Department of Software Science and Engineering@PKUEmail verificata su pku.edu.cn
- Doug MontgomeryManager, Internet and Scalable Systems Research, NISTEmail verificata su nist.gov
- Renee BryceUniversity of North TexasEmail verificata su unt.edu
- Dr. Kotikalapudi SriramNational Institute of Standards and TechnologyEmail verificata su nist.gov
- Paul E. BlackNISTEmail verificata su nist.gov
- Mehra N. BorazjanyPh.D Computer Science, University of Texas at ArlingtonEmail verificata su mavs.uta.edu
- Angelos StavrouProfessor at Virginia TechEmail verificata su vt.edu
- Constantinos KoliasAssociate Professor, University of IdahoEmail verificata su uidaho.edu
- Jacek CzerwonkaMicrosoft Corp.Email verificata su microsoft.com
Segui
D. Richard (Rick) Kuhn
Computer scientist, National Institute of Standards and Technology (NIST)
Email verificata su nist.gov - Home page