Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Guodong ShaoNational Institute of Standards and TechnologyVerified email at nist.gov
Daniel MenasceProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Juan LuoGeorge Mason UniversityVerified email at gmu.edu
Mohan KrishnamoorthyRMIT UniversityVerified email at rmit.edu.au
lei zhangThomson ReutersVerified email at thomsonreuters.com
Malak Talal Al-NoryEffat University and Massachusetts Institute of TechnologyVerified email at effatuniversity.edu.sa
Mohamad Omar Nachawati, PhDResearch Software EngineerVerified email at gmu.edu
Csilla FarkasAssociate Professor of Computer Science and Engineering, South Carolina UniveristyVerified email at cec.sc.edu
Chun-Kit NganWorcester Polytechnic Institute, Data Science and Artificial Intelligence ProgramVerified email at wpi.edu
Michael MaherReasoning Research InstituteVerified email at reasoning.org.au
Duck Bong KimTennessee Technological UniversityVerified email at tntech.edu
Claudio BettiniUniversitą degli Studi di MilanoVerified email at unimi.it
William "Bill" Z. Bernstein, PhDAir Force Research LaboratoryVerified email at us.af.mil
Jessica LinGeorge Mason UniversityVerified email at gmu.edu
Hanan Abdullah MengashPrincess Nourah bint Abdulrahman University, College of Computer and Information Sciences, Dep. ofVerified email at pnu.edu.sa
Susan FarleyPhD, George Mason UniversityVerified email at davefarley.org
Joxan JaffarNational University of SingaporeVerified email at comp.nus.edu.sg
Mohan KrishnamoorthyArgonne National LaboratoryVerified email at anl.gov
Follow
Alexander Brodsky
Professor, Department of Computer Science, George Mason University
Verified email at gmu.edu - Homepage