Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Guodong ShaoNational Institute of Standards and TechnologyVerified email at nist.gov
Daniel MenasceProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Juan (Judy) LuoGeorge Mason UniversityVerified email at gmu.edu
Mohan KrishnamoorthyUniversity of QueenslandVerified email at uq.edu.au
lei zhangThomson ReutersVerified email at thomsonreuters.com
Malak Talal Al-NoryEffat University and Massachusetts Institute of TechnologyVerified email at effatuniversity.edu.sa
Mohamad Omar NachawatiGeorge Mason UniversityVerified email at gmu.edu
Csilla FarkasAssociate Professor of Computer Science and Engineering, South Carolina UniveristyVerified email at cec.sc.edu
Michael MaherReasoning Research InstituteVerified email at reasoning.org.au
Chun-Kit NganWorcester Polytechnic Institute, Data Science ProgramVerified email at wpi.edu
Claudio BettiniUniversity of MilanVerified email at unimi.it
Duck Bong KimTennessee Technological UniversityVerified email at tntech.edu
William "Bill" Z. Bernstein, PhDAir Force Research LaboratoryVerified email at us.af.mil
Jessica LinGeorge Mason UniversityVerified email at gmu.edu
Hanan Abdullah MengashPrincess Nourah bint Abdulrahman University, College of Computer and Information Sciences, Dep. ofVerified email at pnu.edu.sa
Susan FarleyPhD, George Mason UniversityVerified email at davefarley.org
Joxan JaffarNational University of SingaporeVerified email at comp.nus.edu.sg
Mohan KrishnamoorthyArgonne National LaboratoryVerified email at anl.gov
Follow
Alexander Brodsky
Professor, Department of Computer Science, George Mason University
Verified email at gmu.edu - Homepage