Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bohdan NebeshDepartment of DefenseVerified email at tycho.ncsc.mil
ER BurtnerPacific Northwest National LaboratoryVerified email at pnnl.gov
Anita KomlodiAssociate Professor, UMBCVerified email at umbc.edu
Alex EndertAssociate Professor, Georgia TechVerified email at gatech.edu
Leslie M. BlahaAir Force Research LaboratoryVerified email at us.af.mil
Dustin ArendtPacific Northwest National LaboratoryVerified email at pnnl.gov
Josiah DykstraTrail of BitsVerified email at trailofbits.com
John R. GershPrincipal Engineer, Johns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
Daniel M. BestSr. Cyber Security Researcher, PNNLVerified email at pnnl.gov
Emily WallEmory UniversityVerified email at emory.edu
Randall M RohrerUS Department of DefenseVerified email at acm.org
Yee-Yin ChoongVerified email at nist.gov
Georges GrinsteinResearch Professor, University of Massachusetts AmherstVerified email at cs.umass.edu
Robert S. GutzwillerAssociate Professor, Arizona State UniversityVerified email at asu.edu
Nick CramerPacific Northwest National LaboratoryVerified email at pnnl.gov
David GillenPacific Northwest National LaboratoryVerified email at pnnl.gov
Shawn D. HamptonPacific Northwest National LabVerified email at pnnl.gov
Lauren BradelVerified email at vt.edu
Ariel M. GreenbergJohns Hopkins University / APLVerified email at jhuapl.edu
samir khullerBarris Professor and Chair of Computer Science, Northwestern UniversityVerified email at northwestern.edu