Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Christos PapadopoulosUniversity of MemphisEmail verificata su memphis.edu
- Jelena MirkovicUniversity of Southern CaliforniaEmail verificata su isi.edu
- John HeidemannUniversity of Southern California / Information Sciences InstituteEmail verificata su isi.edu
- Sonia FahmyProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaEmail verificata su usc.edu
- Anuradha AnnaswamySenior Research Scientist, MITEmail verificata su mit.edu
- Aranya ChakraborttyProfessor of Electrical EngineeringEmail verificata su ncsu.edu
- Saurabh AminMassachusetts Institute of TechnologyEmail verificata su mit.edu
- Paul C. WoodEmail verificata su meta.com
- Arun ViswanathanCyber Security Researcher at Jet Propulsion LaboratoryEmail verificata su jpl.nasa.gov
- Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityEmail verificata su purdue.edu
- Seyed Mehran DibajiMITEmail verificata su mit.edu
- Zahaib AkhtarAmazon Prime Video / NCSUEmail verificata su amazon.com
- Ethan Katz-BassettAssociate Professor, Columbia UniversityEmail verificata su columbia.edu
- Tim YardleyPrincipal Research Scientist / Associate DirectorEmail verificata su illinois.edu
- William H SandersCarnegie Mellon UniversityEmail verificata su cmu.edu