Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Igor LinkovUS Army Corps of EngineersVerified email at usace.army.mil
Edward J. M. Colbert, Ph.D.Virginia TechVerified email at ecolbert.com
Jeffrey M. KeislerUniversity of Massachusetts BostonVerified email at umb.edu
Alberts DavidSenior Fellow IDA - President IC2IVerified email at internationalc2institute.org
cliff wangNCSUVerified email at ncsu.edu
Martin DrašarInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
Alexander A. GaninUniversity of VirginiaVerified email at virginia.edu
Benoît LeBlancEnseignant/Chercheur à l'Ecole Nationale Supérieure de Cognitique (Bordeaux INP)Verified email at ensc.fr
Krzysztof RzadcaInstitute of Informatics, University of Warsaw and GoogleVerified email at mimuw.edu.pl
Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Mauno PihelgasCyber Security Researcher, Systems EngineerVerified email at pihelgas.eu
Nandi LesliePrincipal Technical Fellow, Raytheon TechnologiesVerified email at rtx.com
Rami S MangoubiC.S. Draper LaboratoryVerified email at draper.com
Kenneth D. ForbusProfessor of Computer Science, Northwestern UniversityVerified email at northwestern.edu
Daniel A. EisenbergAssistant Professor of Operations Research, Naval Postgraduate SchoolVerified email at nps.edu
Thomas P SeagerAssociate Professor of Sustainable Engineering, Arizona State UniversityVerified email at asu.edu
Prof. Alexander GutfraindLoyola University ChicagoVerified email at cornell.edu
Emanuele MassaroEuropean Commission Joint Research CenterVerified email at ec.europa.eu
Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
Fernando MaymiIronNet Cybersecurity, Inc.Verified email at maymi.net