Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityEmail verificata su northeastern.edu
- Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryEmail verificata su mit.edu
- David ChoffnesAssociate Professor, Northeastern UniversityEmail verificata su ccs.neu.edu
- Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyEmail verificata su gatech.edu
- Alan MisloveProfessor of Computer Science, Northeastern UniversityEmail verificata su ccs.neu.edu
- Bryan C. WardVanderbilt UniversityEmail verificata su vanderbilt.edu
- Arash Molavi KakhkiThousandEyesEmail verificata su thousandeyes.com
- Benjamin E. UjcichGeorgetown UniversityEmail verificata su georgetown.edu
- Adam BatesAssistant Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- William H SandersCarnegie Mellon UniversityEmail verificata su cmu.edu
- Endadul HoqueSyracuse UniversityEmail verificata su syr.edu
- Shawn OstermannSenior Associate Dean, Russ College of Engineering and Technology, Ohio UniversityEmail verificata su ohio.edu
- Matthew JagielskiGoogle DeepMindEmail verificata su google.com
- Nathan BurowMIT Lincoln LaboratoryEmail verificata su ll.mit.edu
- Juliana FurgalaCybersecurity Researcher, MIT Lincoln LaboratoryEmail verificata su mit.edu
- Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryEmail verificata su ll.mit.edu
- Anne EdmundsonPrinceton UniversityEmail verificata su alumni.princeton.edu
- Hyojeong LeePurdue UniversityEmail verificata su purdue.edu
- Dan GoldwasserPurdue UniversityEmail verificata su purdue.edu
- Maria Leonor PachecoAssistant Professor, University of Colorado BoulderEmail verificata su colorado.edu