Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- Lingyu WangProfessor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia UniversityEmail verificata su ciise.concordia.ca
- Michael JacobsGeorge Mason UniversityEmail verificata su iongroup.com
- Eric RobertsonPAR GovernmentEmail verificata su partech.com
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityEmail verificata su gmu.edu
- Eric T. HarleyHarley Labs, LLCEmail verificata su ericharley.com
- Vijay V RaghavanAlfred and Helen Lamson Endowed Professor in Computer Science, University of Louisiana at LafayetteEmail verificata su louisiana.edu
- Cheehung henry ChuUniversity of Louisiana at LafayetteEmail verificata su louisiana.edu
- Vipin SwarupThe MITRE CorporationEmail verificata su mitre.org
- Duminda WijesekeraGeorge mason UniversityEmail verificata su gmu.edu
- Matthew ElderJohns Hopkins University Applied Physics LaboratoryEmail verificata su jhuapl.edu
- Ingrid DaubechiesDuke UniversityEmail verificata su math.duke.edu
- James CurboJohns Hopkins UniversityEmail verificata su jhu.edu
- Ben KingUniversity of MichiganEmail verificata su umich.edu
- Pierre TrepagnierEmail verificata su ll.mit.edu
- Lynn KeuthanThe George Washington UniversityEmail verificata su gwu.edu
- Alexander KottUS Army Research LaboratoryEmail verificata su army.mil
- Luis Muñoz-GonzálezSenior Research Scientist, Telefónica ResearchEmail verificata su telefonica.com
- Diane S. HenshelO'Neill School of Public and Environmental Affairs, Indiana UniversityEmail verificata su indiana.edu
- Igor LinkovUS Army Corps of EngineersEmail verificata su usace.army.mil
Segui