Get my own profile
Public access
View all74 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Mainak ChatterjeeApple Inc.Verified email at apple.com
- Shahriar BadshaSr. Security Engineer, General MotorsVerified email at gm.com
- R. ChandramouliStevens Institute of TechnologyVerified email at ieee.org
- Iman VakiliniaAssociate Professor, University of North FloridaVerified email at unf.edu
- Deepak K. ToshAssistant ProfessorVerified email at utep.edu
- Suman BhuniaAssistant Professor, Miami University - OhioVerified email at miamioh.edu
- Paulo Alexandre RegisAssistant Professor, Southeastern Louisiana UniversityVerified email at southeastern.edu
- S. AnandNew York Institute of TechnologyVerified email at nyit.edu
- Samrat GangulyApple IncVerified email at apple.com
- Charles KamhouaDEVCOM Army Research Laboratory, Adversarial Resilient Cyber Methodology Team LeaderVerified email at army.mil
- Amar Nath PatraPhD Student, Department of Computer Science and Engineering, University of Nevada RenoVerified email at nevada.unr.edu
- Swastik BrahmaAssociate Professor, Department of Computer Science, University of CincinnatiVerified email at ucmail.uc.edu
- Felisa Vázquez-AbadProfessor of Computer ScienceVerified email at hunter.cuny.edu
- Kenneth EzirimResearcher, CUNY Graduate CenterVerified email at gradcenter.cuny.edu
- raja neogiDell EMCVerified email at emc.com
- Rauf IzmailovPeraton LabsVerified email at mail.peratonlabs.com
- Shameek BhattacharjeeAssistant Professor, Western Michigan UniversityVerified email at wmich.edu