Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
- James H. AndersonKenan Professor of Computer Science, The University of North Carolina at Chapel HillVerified email at cs.unc.edu
- Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
- Christopher J. KennaUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
- Glenn A. ElliottUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
- Namhoon KimMicrosoftVerified email at microsoft.com
- Luiz Felipe PerroneDepartment of Computer Science, Bucknell UniversityVerified email at bucknell.edu
- Samuel JeroNetwork Security Researcher, MIT Lincoln LaboratoryVerified email at ll.mit.edu
- Nathan BurowMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryVerified email at ll.mit.edu
- Robert J. WallsWorcester Polytechnic InstituteVerified email at wpi.edu
- Craig A. ShueProfessor and Department Head of Computer Science, Worcester Polytechnic InstituteVerified email at cs.wpi.edu
- Claudio CicconettiIIT-CNRVerified email at iit.cnr.it
- Sanjoy BaruahWashington University in Saint LouisVerified email at wustl.edu
- Zhishan GuoAssociate Professor at North Carolina State UniversityVerified email at ncsu.edu
- Shai CaspinGraduate Student, Princeton UniversityVerified email at princeton.edu
- Abhilash ThekkilakattilScania, SwedenVerified email at scania.com
- Chad SpenskyCEO, AllthenticateVerified email at allthenticate.net
- Ryan BurrowMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Nathan RyanProfessor of Mathematics, Bucknell UniversityVerified email at bucknell.edu
- Samuel MergendahlMIT Lincoln LaboratoryVerified email at ll.mit.edu