Get my own profile
Public access
View all12 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Rajesh GanesanGeorge Mason UniversityVerified email at gmu.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Hasan CamBest BuyVerified email at bestbuy.com
- Soumyadeep HorePhd. Student, University of South FloridaVerified email at usf.edu
- Nathaniel D. BastianUnited States Military AcademyVerified email at westpoint.edu
- Jalal GhadermaziUniversity of South FloridaVerified email at usf.edu
- Mohammad NorooziPh.D. Candidate, University of South FloridaVerified email at usf.edu
- George CybenkoThayer School of Engineering at DartmouthVerified email at dartmouth.edu
- Changhyun KwonDepartment of Industrial and Systems Engineering, KAISTVerified email at kaist.ac.kr
- Young Jae JANGAssociate Professor of Industrial and Systems Engineering at KAISTVerified email at kaist.ac.kr
- Sungwook JangVerified email at kaist.ac.kr
- Aigerim BogyrbayevaVerified email at sdu.edu.kz
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
- Sridhar VenkatesanPeraton LabsVerified email at peratonlabs.com
- Diwas PaudelDepartment of Industrial and Management Systems Engineering, University of South FloridaVerified email at usf.edu
- Sudeep SarkarDistinguished University Professor, Computer Science and Engineering, University of South FloridaVerified email at usf.edu
- Hadi Gard (Charkhgard)Associate Professor, University of South FloridaVerified email at usf.edu
- Xinming (Simon) OuProfessor of Computer Science and Engineering, University of South FloridaVerified email at usf.edu
- Fariha MoomtaheenUniversity of West FloridaVerified email at usf.edu
- Arunesh SinhaRutgers UniversityVerified email at rutgers.edu