Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Alex KentEmail verificata su aplace.org
- Joshua C NeilChief Data Scientist, SecuronixEmail verificata su securonix.com
- Daniel QuistNew Mexico TechEmail verificata su cs.nmt.edu
- Curtis HashLANL / EYEmail verificata su lanl.gov
- Michael K LangLos Alamos National LaboratoryEmail verificata su lanl.gov
- Hakan AkkanNew Mexico ConsortiumEmail verificata su nmt.edu
- Hugh WimberlyEmail verificata su nmt.edu
- Dongwan ShinProfessor of Computer Science and Engineering, New Mexico TechEmail verificata su nmt.edu
- William M.S. StoutSandia National Laboratories, University of New MexicoEmail verificata su sandia.gov
- Brajendra PandaUniversity of ArkansasEmail verificata su uark.edu
- Roger WainwrightUniversity of TulsaEmail verificata su utulsa.edu
- Mirko ViroliFull Professor of Computer Science, Università di BolognaEmail verificata su unibo.it
- Ronaldo MenezesProfessor of Data and Network Science, University of ExeterEmail verificata su exeter.ac.uk
- Theodore E. SimosCenter for Applied Mathematics and Bioinformatics, Gulf University for Science and TechnologyEmail verificata su ulstu.ru
- Mathew J. PalakalProfessor of Informatics and Computer Science, Indiana University Purdue University, IndianapolisEmail verificata su iupui.edu
Segui
Lorie Liebrock
Director of Cybersecurity Centers, Professor of Computer Science & Eng., New Mexico Tech
Email verificata su nmt.edu