Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
- Carol X SongPurdue UniversityVerified email at purdue.edu
- Sanjiv KumarAuburn UniversityVerified email at auburn.edu
- Mohammad NadimPostdoctoral Research AssociateVerified email at utsa.edu
- David AkopianProfessor, University of Texas at San AntonioVerified email at utsa.edu
- Peyman Najafirad (Paul Rad)University of Texas at San AntonioVerified email at utsa.edu
- Vivek Vijay SarkaleUniversity of Texas at San AntonioVerified email at dsci.in
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- Venkatesh MerwadePurdue UniversityVerified email at purdue.edu
- Aaron GoldnerAAAS Science and Technology Fellow at DOEVerified email at purdue.edu
- Matthew HuberPurdue University and University of New HampshireVerified email at purdue.edu