Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ian MolloyIBM ResearchVerified email at us.ibm.com
- Taesung LeeIBM ResearchVerified email at ibm.com
- Stephanie ForrestProfessor of Computer Science, Univ. of New MexicoVerified email at santafe.edu
- Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
- Steven HofmeyrLawrence Berkeley National LaboratoryVerified email at lbl.gov
- Wilka CarvalhoHarvardVerified email at g.harvard.edu
- Maria-Irina NicolaeBosch Research, Bosch Center for AIVerified email at bosch.com
- Tran Ngoc Minh - PhDAI Researcher - IBM Research IrelandVerified email at ibm.com
- George StelleLANLVerified email at lanl.gov
- Ambrish RawatSenior Research Scientist, IBM ResearchVerified email at ie.ibm.com
- Mathieu SinnIBM Research Staff MemberVerified email at ie.ibm.com
- Michael M. GroatUniversity of New MexicoVerified email at cs.unm.edu
- Wenbo HeAssociate Professor of Department of Computing and Software, McMaster UniversityVerified email at mcmaster.ca
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Melanie MosesUniversity of New MexicoVerified email at cs.unm.edu
- Robert James BrownProfessor of Geophysics, University of StavangerVerified email at uis.no
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl