Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mohamed Kashef (Mohamed Hany)National Institute of Standards and TechnologyVerified email at nist.gov
- Yongkang LiuFDAVerified email at uwaterloo.ca
- Henrik SandbergProfessor of Decision and Control Systems, KTH Royal Institute of TechnologyVerified email at kth.se
- Justin RuthsAssistant Professor of Mechanical Engineering and Systems Engineering, UT DallasVerified email at utdallas.edu
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mustafa Amir FaisalProcter and GambleVerified email at pg.com
- Jairo GiraldoResearch Assistant Professor, University of UtahVerified email at utah.edu
- Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
- Junia ValenteToyota Tsusho Systems US, Inc.Verified email at toyota.com
- Jeanne QuimbyNational Institute of Standard and TechnologyVerified email at nist.gov
- Keith StoufferNational Institute of Standards and TechnologyVerified email at nist.gov
- Sebti Foufou, PhDProf. of Computer Science, University of Sharjah, UAEVerified email at sharjah.ac.ae
- Nader MoayeriNational Institute of Standards and TechnologyVerified email at nist.gov
- Jing GengNational Institute of Standards and Technology / University of MarylandVerified email at nist.gov
- Dave CavalcantiIntel CorporatinVerified email at intel.com
- Zhibo PangABB Corporate Research, and KTH Royal Institute of Technology, SwedenVerified email at kth.se
- Shuvra S. BhattacharyyaProfessor of Electrical and Computer Engineering, University of MarylandVerified email at umd.edu
- Michele LuvisottoABB Corporate Research, SwedenVerified email at se.abb.com
- Xiaolin JiangEricsson ResearchVerified email at ericsson.com
- Carlo FischioneProfessor, KTH, EECS, Network and Systems EngineeringVerified email at kth.se