Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- James H. AndersonKenan Professor of Computer Science, The University of North Carolina at Chapel HillEmail verificata su cs.unc.edu
- Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryEmail verificata su mit.edu
- Christopher J. KennaUniversity of North Carolina at Chapel HillEmail verificata su cs.unc.edu
- Glenn A. ElliottUniversity of North Carolina at Chapel HillEmail verificata su cs.unc.edu
- Namhoon KimMicrosoftEmail verificata su microsoft.com
- Luiz Felipe PerroneDepartment of Computer Science, Bucknell UniversityEmail verificata su bucknell.edu
- Samuel JeroNetwork Security Researcher, MIT Lincoln LaboratoryEmail verificata su ll.mit.edu
- Nathan BurowMIT Lincoln LaboratoryEmail verificata su ll.mit.edu
- Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryEmail verificata su ll.mit.edu
- Robert J. WallsWorcester Polytechnic InstituteEmail verificata su wpi.edu
- Craig A. ShueProfessor and Department Head of Computer Science, Worcester Polytechnic InstituteEmail verificata su cs.wpi.edu
- Claudio CicconettiIIT-CNREmail verificata su iit.cnr.it
- Sanjoy BaruahWashington University in Saint LouisEmail verificata su wustl.edu
- Zhishan GuoAssociate Professor at North Carolina State UniversityEmail verificata su ncsu.edu
- Shai CaspinGraduate Student, Princeton UniversityEmail verificata su princeton.edu
- Abhilash ThekkilakattilScania, SwedenEmail verificata su scania.com
- Chad SpenskyCEO, AllthenticateEmail verificata su allthenticate.net
- Ryan BurrowMIT Lincoln LaboratoryEmail verificata su ll.mit.edu
- Nathan RyanProfessor of Mathematics, Bucknell UniversityEmail verificata su bucknell.edu
- Samuel MergendahlMIT Lincoln LaboratoryEmail verificata su ll.mit.edu