Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Rocky SlavinAssistant Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Jianwei NiuProfessor of Computer Science, UTSAEmail verificata su utsa.edu
- Xiaoyin WangAssociate Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Mitra Bokaei HosseiniAssistant Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityEmail verificata su law.fordham.edu
- Florian SchaubUniversity of MichiganEmail verificata su umich.edu
- Hanan HibshiCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Smita GhaisasTata Consultancy Services ltd. TRDDCEmail verificata su tcs.com
- Elena PetersonPacific Northwest National LaboratoryEmail verificata su pnnl.gov
- Daniel M. BestSr. Cyber Security Researcher, PNNLEmail verificata su pnnl.gov
- Jane Cleland-HuangUniversity of Notre DameEmail verificata su nd.edu
- Munindar P SinghProfessor of Computer Science, North Carolina State UniversityEmail verificata su ncsu.edu