Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Alex KentVerified email at aplace.org
- Joshua C NeilChief Data Scientist, SecuronixVerified email at securonix.com
- Daniel QuistNew Mexico TechVerified email at cs.nmt.edu
- Curtis HashLANL / EYVerified email at lanl.gov
- Michael K LangLos Alamos National LaboratoryVerified email at lanl.gov
- Hakan AkkanNew Mexico ConsortiumVerified email at nmt.edu
- Hugh WimberlyVerified email at nmt.edu
- Dongwan ShinProfessor of Computer Science and Engineering, New Mexico TechVerified email at nmt.edu
- William M.S. StoutSandia National Laboratories, University of New MexicoVerified email at sandia.gov
- Brajendra PandaUniversity of ArkansasVerified email at uark.edu
- Roger WainwrightUniversity of TulsaVerified email at utulsa.edu
- Mirko ViroliFull Professor of Computer Science, Università di BolognaVerified email at unibo.it
- Ronaldo MenezesProfessor of Data and Network Science, University of ExeterVerified email at exeter.ac.uk
- Theodore E. SimosCenter for Applied Mathematics and Bioinformatics, Gulf University for Science and TechnologyVerified email at ulstu.ru
- Mathew J. PalakalProfessor of Informatics and Computer Science, Indiana University Purdue University, IndianapolisVerified email at iupui.edu
Follow
Lorie Liebrock
Director of Cybersecurity Centers, Professor of Computer Science & Eng., New Mexico Tech
Verified email at nmt.edu