Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
- James H. AndersonKenan Professor of Computer Science, The University of North Carolina at Chapel HillVerified email at cs.unc.edu
- Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
- Christopher J. KennaUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
- Glenn A. ElliottUniversity of North Carolina at Chapel HillVerified email at cs.unc.edu
- Namhoon KimMicrosoftVerified email at microsoft.com
- Luiz Felipe PerroneDepartment of Computer Science, Bucknell UniversityVerified email at bucknell.edu
- Samuel JeroSystems Security Researcher, MIT Lincoln LaboratoryVerified email at ll.mit.edu
- F. Donelson SmithResearch Professor of Computer Science, University of North Carolina at Chapel HillVerified email at cs.unc.edu
- Nathan BurowMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Steven R. GomezMassachusetts Institute of Technology, Lincoln LaboratoryVerified email at ll.mit.edu
- Sanjoy BaruahWashington University in Saint LouisVerified email at wustl.edu
- Robert J. WallsWorcester Polytechnic InstituteVerified email at wpi.edu
- Craig A. ShueProfessor and Department Head of Computer Science, Worcester Polytechnic InstituteVerified email at cs.wpi.edu
- Nathan OtternessUniverisity of North Carolina at Chapel HillVerified email at cs.unc.edu
- Juliana FurgalaCybersecurity Researcher, MIT Lincoln LaboratoryVerified email at mit.edu
- Claudio CicconettiIIT-CNRVerified email at iit.cnr.it
- GIOVANNI STEAUniversity of PisaVerified email at unipi.it
- Zhishan GuoAssociate Professor at North Carolina State UniversityVerified email at ncsu.edu
- Shai CaspinGraduate Student, Princeton UniversityVerified email at princeton.edu
- Abhilash ThekkilakattilScania, SwedenVerified email at scania.com