Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Lingyu WangProfessor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia UniversityVerified email at ciise.concordia.ca
Michael JacobsGeorge Mason UniversityVerified email at iongroup.com
Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
Cheehung henry ChuUniversity of Louisiana at LafayetteVerified email at louisiana.edu
Eric T. HarleyVerified email at ericharley.com
Vijay V RaghavanAlfred and Helen Lamson Endowed Professor in Computer Science, University of Louisiana at LafayetteVerified email at louisiana.edu
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Matthew ElderJohns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
Ingrid DaubechiesDuke UniversityVerified email at math.duke.edu
Lynn KeuthanThe George Washington UniversityVerified email at gwu.edu
Alexander KottUS Army Research LaboratoryVerified email at army.mil
Luis Muñoz-GonzálezResearch Associate, Imperial College LondonVerified email at imperial.ac.uk
Diane S. HenshelO'Neill School of Public and Environmental Affairs, Indiana UniversityVerified email at indiana.edu
Igor LinkovUS Army Corps of EngineersVerified email at usace.army.mil
Nian-Feng TzengProfessor, Center for Advanced Computer Studies, University of LouisianaVerified email at cacs.louisiana.edu
Paul D. RoweThe MITRE CorporationVerified email at mitre.org
Arun LakhotiaUniversity of Louisiana at LafayetteVerified email at louisiana.edu
Follow