Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eugene H. SpaffordProfessor, Purdue UniversityVerified email at purdue.edu
Robert C. MillerProfessor, Computer Science, MITVerified email at mit.edu
Alan SchwartzProfessor of Medical Education and Research Professor of Pediatrics, University of Illinois at ChicagoVerified email at uic.edu
Vassil RoussevProfessor of Computer Science, University of New OrleansVerified email at cs.uno.edu
John M. AbowdEdmund Ezra Day Professor Emeritus, Cornell University; U.S. Census Bureau (retired)Verified email at cornell.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Ravi PappuApeiron Labs, Inc.Verified email at alum.mit.edu
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
Christian StranskyKKH Kaufmännische KrankenkasseVerified email at sec.uni-hannover.de
Joel YoungHireguide - Chief Technology OfficerVerified email at hireguide.com
Daniel KiferPenn State UniversityVerified email at cse.psu.edu
Kevin D. FairbanksPrincipal Cyber Operations Engineer, MITREVerified email at fairbanksphd.com
David J. MalanHarvard UniversityVerified email at harvard.edu
Kam WoodsResearch Scientist, UNC Chapel HillVerified email at email.unc.edu
Robert BeverlyCenter for Measurement and Analysis of Network Data (CMAND)Verified email at nps.edu
Alex J. NelsonUniversity of California, Santa CruzVerified email at cs.ucsc.edu