³» ÇÁ·ÎÇÊ ¸¸µé±â
°ø°³ ¾×¼¼½º
¸ðµÎ º¸±âÀÚ·á 39°³
ÀÚ·á 7°³
°ø°³
ºñ°ø°³
ÀçÁ¤ Áö¿ø ¿ä±¸»çÇ× ±âÁØ
°øµ¿ ÀúÀÚ
Guohong CaoProfessor, the Pennsylvania State Universitycse.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure Informationgmu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State Universityist.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Sanjeev SetiaDepartment of Computer Science, George Mason Universitygmu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Dinghao WuPennsylvania State Universitypsu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Yoon-Chan JhiDirector of Software Security in Samsung SDS Research Center, Seoul, Koreasamsung.comÀÇ À̸ÞÀÏ È®ÀεÊ
Heqing HuangIBM Thomas J. Watson Research Centerus.ibm.comÀÇ À̸ÞÀÏ È®ÀεÊ
Thomas La PortaPenn State Universitycse.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Heng XuProfessor of Management, Warrington College of Business, University of Floridaufl.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Daojing HeSchool of Computer Science and Engineering, South China University of Technologyscut.edu.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Yu ChenProfessor at Dept. of Electrical & Computer Engr, Binghamton University, SUNYbinghamton.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado Springsuccs.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Peng NingGooglegoogle.comÀÇ À̸ÞÀÏ È®ÀεÊ
Wensheng ZhangAssociate Professor of Computer Science, Iowa State Universityiastate.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Qinghua LiAssociate Professor, University of Arkansasuark.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Wei XUPalo Alto Networkspaloaltonetworks.comÀÇ À̸ÞÀÏ È®ÀεÊ
Yilu ZhouAssociate Professor of Business, Fordham Universityfordham.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Lannan Lisa LuoDepartment of Computer Science, George Mason Universitygmu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Jiang MingTulane Universitytulane.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Jiqiang LiuProfessor of Computer Sciencebjtu.edu.cnÀÇ À̸ÞÀÏ È®ÀεÊ