Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityEmail verificata su duke.edu
- Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaEmail verificata su umn.edu
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaEmail verificata su kaist.ac.kr
- Shriram RajagopalanGoogleEmail verificata su google.com
- Hani JamjoomPrincipal Research Scientist and Manager, IBM Watson Research, New YorkEmail verificata su us.ibm.com
- Eric Chan-TinAssociate Professor of Cybersecurity, Loyola University ChicagoEmail verificata su cs.luc.edu
- Alina OpreaNortheastern UniversityEmail verificata su neu.edu
- Ting-Fang YenLaceworkEmail verificata su lacework.net
- Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Email verificata su cornell.edu
- Sanjay ChandrasekaranPhD Candidate, University of California Santa BarbaraEmail verificata su ucsb.edu
- Max SchuchardAssistant Professor, University of TennesseeEmail verificata su utk.edu
- Eugene VassermanKansas State UniversityEmail verificata su ksu.edu
- Seyed K. FayazCMUEmail verificata su seyedfayaz.com
- Todd MillsteinProfessor of Computer Science, UCLAEmail verificata su cs.ucla.edu
- Ratul MahajanUniversity of WashingtonEmail verificata su ratul.org
- Daniel HalperinAWSEmail verificata su halper.in