Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Stephen F BushGE ResearchVerified email at research.ge.com
- Yuan HongUniversity of ConnecticutVerified email at uconn.edu
- Ersin DincelliAssistant Professor of Information Systems | University of Colorado DenverVerified email at ucdenver.edu
- Merrill WarkentinJames J. Rouse Endowed Professor of Information Systems, Mississippi State UniversityVerified email at msstate.edu
- Jagdish GangollyAssociate Professor Emeritus of InformaticsVerified email at albany.edu
- Vagelis PapakonstantinouProfessor, Faculty of Law & Criminology, Vrije Universiteit BrusselVerified email at vub.be
- S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaVerified email at virginia.edu
- Haibing LuSanta Clara UniversityVerified email at scu.edu
- Nicholas RizzoUniversity at AlbanyVerified email at albany.edu
- Prabhat HajelaRensselaer Polytechnic InstituteVerified email at rpi.edu
- Panagiotis KarrasProfessor, University of CopenhagenVerified email at di.ku.dk
- Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
- Justin Scott GiboneyBrigham Young UniversityVerified email at byu.edu
- Joseph S. ValacichMuzzy Endowed Chair, The University of ArizonaVerified email at arizona.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
- Paul MiesingUniversity at Albany, State University of New York - EmeritusVerified email at albany.edu
- Hwee-Joo Kam, D.Sc., CISSPAssociate Professor of Cybersecurity, University of TampaVerified email at ut.edu
- Nic DePaulaWayne State UniversityVerified email at wayne.edu
- Raouf BoutabaProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Scott EvansPrincipal Scientist Machine Learning, GE ResearchVerified email at ge.com