Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
Igor LinkovUS Army Corps of EngineersVerified email at usace.army.mil
Edward J. M. Colbert, Ph.D.Virginia TechVerified email at ecolbert.com
Jeffrey M. KeislerUniversity of Massachusetts BostonVerified email at umb.edu
Alberts DavidSenior Fellow IDA - President IC2IVerified email at internationalc2institute.org
Martin DrašarInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
cliff wangNCSUVerified email at ncsu.edu
Benoît LeBlancEnseignant/Chercheur à l'Ecole Nationale Supérieure de Cognitique (Bordeaux INP)Verified email at ensc.fr
Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Alexander A. GaninUniversity of VirginiaVerified email at virginia.edu
Krzysztof RzadcaInstitute of Informatics, University of Warsaw and GoogleVerified email at mimuw.edu.pl
Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
Mauno PihelgasSenior Security ResearcherVerified email at pihelgas.eu
Rami S MangoubiC.S. Draper LaboratoryVerified email at draper.com
Kenneth D. ForbusProfessor of Computer Science, Northwestern UniversityVerified email at northwestern.edu
Thomas P SeagerAssociate Professor of Sustainable Engineering, Arizona State UniversityVerified email at asu.edu
Prof. Alexander GutfraindLoyola University ChicagoVerified email at cornell.edu
Emanuele MassaroEuropean Commission, Joint Research CentreVerified email at ec.europa.eu
Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
Fernando MaymiIronNet Cybersecurity, Inc.Verified email at maymi.net
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu