Get my own profile
Public access
View all80 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
Jaehong ParkUniversity of Alabama in HuntsvilleVerified email at uah.edu
Maanak GuptaAssociate Chair and Associate Professor of Computer Science, Tennessee Tech UniversityVerified email at tntech.edu
Xinwen ZhangHiretualVerified email at hiretual.comSushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Smriti BhattPurdue UniversityVerified email at purdue.edu
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.govJames BensonUniversity of Texas at San AntonioVerified email at utsa.edu
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.eduYuan ChengUniversity of Nottingham Ningbo ChinaVerified email at nottingham.edu.cn
Khalid BijonSnowflakeVerified email at snowflake.com
Mahmoud AbdelsalamAssistant Professor, North Carolina A&T State UniversityVerified email at ncat.edu
Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.govDang NguyenAmazon Web ServicesVerified email at my.utsa.edu