Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Edward SobieskProfessor, Army Cyber Institute, United States Military AcademyVerified email at westpoint.edu
Nathaniel D. BastianUnited States Military AcademyVerified email at westpoint.edu
Michael C. FuUniversity of MarylandVerified email at umd.edu
Jean BlairDistinguished Professor of Innovation and Professor of Computer Science, United States MilitaryVerified email at westpoint.edu
Fernando MaymiIronNet Cybersecurity, Inc.Verified email at maymi.net
Brian J. LundayProfessor of Operations Research, Air Force Institute of TechnologyVerified email at afit.edu
Dr. Inbal YahavColler School of ManagementVerified email at tauex.tau.ac.il
John SilberholzAssistant Professor, University of MichiganVerified email at umich.edu
Ritvik SahajpalDepartment of Geographical Sciences, University of Maryland College ParkVerified email at umd.edu
Yiwei ChenTemple University, Fox School of BusinessVerified email at temple.edu
Bruce L. GoldenProfessor, University of MarylandVerified email at umd.edu
Michael J. Kwinn, Jr.Professor of Systems Engineering, US Military AcademyVerified email at usma.edu
Scott NestlerUniversity of Notre DameVerified email at nd.edu
Ashok DebUniversity of Southern CaliforniaVerified email at usc.edu
Michael NowatkowskiSchool of Computer and Cyber Sciences at Augusta UniversityVerified email at augusta.edu
Brian NussbaumAssistant Professor CEHC, University at AlbanyVerified email at albany.edu
Lubjana BeshajThe United States Military AcademyVerified email at westpoint.edu
Karl WimmerAssociate Professor of Mathematics, Duquesne UniversityVerified email at duq.edu
Brooks EmerickAssociate Professor of Mathematics, Kutztown UniversityVerified email at kutztown.edu
Taras LakobaUniversity of VermontVerified email at uvm.edu