Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eugene H. SpaffordProfessor, Purdue UniversityVerified email at purdue.edu
Robert C. MillerProfessor, Computer Science, MITVerified email at mit.edu
Alan SchwartzProfessor of Medical Education and Research Professor of Pediatrics, University of Illinois at ChicagoVerified email at uic.edu
Vassil RoussevProfessor of Computer Science, University of New OrleansVerified email at cs.uno.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
John M. AbowdChief Scientist and Associate Director for Research and Methodology, U.S. Census BureauVerified email at census.gov
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Ravi PappuInQTel Inc.Verified email at alum.mit.edu
Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Yasemin AcarThe George Washington University & Max Planck Institute for Security and PrivacyVerified email at sec.uni-hannover.de
Christian StranskyCISPA Helmholtz Center for Information Security, GermanyVerified email at cispa.de
Kam WoodsPostdoctoral Research Associate, University of North Carolina at Chapel HillVerified email at email.unc.edu
Joel YoungHireguide - Chief Technology OfficerVerified email at hireguide.com
Kevin D. FairbanksPrincipal Cyber Operations Engineer, MITREVerified email at fairbanksphd.com
Robert BeverlyAssociate Professor, Naval Postgraduate SchoolVerified email at nps.edu
Alex J. NelsonUniversity of California, Santa CruzVerified email at cs.ucsc.edu
Dave DittrichResearch Scientist, University of WashingtonVerified email at speakeasy.net
abhi shelatProfessor of Computer ScienceVerified email at neu.edu
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu