Get my own profile
Public access
View all3 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Tim FininWillard and Lillian Hackerman Chair in Engineering, University of Maryland, Baltimore CountyVerified email at umbc.edu
Anupam JoshiOros Family Professor in Technology, CSEE Department, UMBCVerified email at umbc.edu
Oshani SeneviratneRensselaer Polytechnic InstituteVerified email at rpi.edu
Jim HendlerProfessor of computer science, RPIVerified email at cs.rpi.edu
Daniel J. Weitzner3Com Founders Principal Research Scientist, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Leilani H. GilpinUC Santa CruzVerified email at ucsc.edu
Dan ConnollyUniversity of Kansas Medical CenterVerified email at madmode.com
Yelena YeshaUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
Rebecca MontanariUniversity of BolognaVerified email at unibo.it
Ilaria LiccardiCSAIL, MITVerified email at mit.edu
Ankesh KhandelwalRensselaer Polytechnic InstituteVerified email at cs.rpi.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
David BauAssistant Professor at Northeastern UniversityVerified email at northeastern.edu
Michael A. SpecterPhD in Electrical Engineering and Computer Science, Massachusetts Institute of TechnologyVerified email at mit.edu
Vaikkunth MugunthanPhD Student , Massachusetts Institute Of TechnologyVerified email at mit.edu
Evan PattonMassachusetts Institute of TechnologyVerified email at mit.edu
Katia SycaraProfessor School of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Murat KantarciogluProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu