Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Eugene H. SpaffordProfessor, Purdue UniversityVerified email at purdue.edu
- Robert C. MillerProfessor, Computer Science, MITVerified email at mit.edu
- Alan SchwartzProfessor of Medical Education and Research Professor of Pediatrics, University of Illinois at ChicagoVerified email at uic.edu
- John M. AbowdEdmund Ezra Day Professor Emeritus, Cornell University; U.S. Census Bureau (retired)Verified email at cornell.edu
- Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Vassil RoussevProfessor of Computer Science, University of New OrleansVerified email at cs.uno.edu
- Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
- Daniel KiferPenn State UniversityVerified email at cse.psu.edu
- Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
- Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
- Christian StranskyKKH Kaufmännische KrankenkasseVerified email at sec.uni-hannover.de
- Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
- Ravi PappuApeiron Labs, Inc.Verified email at alum.mit.edu
- Joel YoungHireguide - Chief Technology OfficerVerified email at hireguide.com
- Kevin D. FairbanksPrincipal Cyber Operations Engineer, MITREVerified email at fairbanksphd.com
- David J. MalanHarvard UniversityVerified email at harvard.edu
- Alex J. NelsonUniversity of California, Santa CruzVerified email at cs.ucsc.edu
- Kam WoodsResearch Scientist, UNC Chapel HillVerified email at email.unc.edu
- Robert BeverlyProfessor of Computer Science, San Diego State UniversityVerified email at sdsu.edu