Get my own profile
Public access
View all31 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
Shamik SuralProfessor, Dept. of Computer Science & Engineering, Indian Institute of Technology, Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
Soon Ae ChunProfessor, CUNY, College of Staten Island and Graduate CenterVerified email at csi.cuny.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Basit ShafiqLahore University of Management Sciences (LUMS)Verified email at lums.edu.pk
Vandana JanejaProfessor of Information Systems, University of Maryland, Baltimore CountyVerified email at umbc.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Haibing LuSanta Clara UniversityVerified email at scu.edu
Heechang ShinIona CollegeVerified email at iona.edu
Yuan HongUniversity of ConnecticutVerified email at uconn.edu
Mahmoud YoussefThe George Washington UniversityVerified email at gwu.edu
Avigdor GalTechnion -- Israel Institute of TechnologyVerified email at technion.ac.il
Anna Lisa FerraraUniversita' del MoliseVerified email at unimol.it
Gennaro ParlatoFull Professor of Computer Science, University of Molise, ItalyVerified email at unimol.it
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Rey KoslowskiProfessor of Political Science, University at Albany (SUNY)Verified email at albany.edu
Follow
Vijayalakshmi Atluri
Distinguished Professor of Information Systems, Rutgers Universtiy
Verified email at rutgers.edu - Homepage