Get my own profile
Public access
View all17 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Mohamed Kashef (Mohamed Hany)National Institute of Standards and TechnologyVerified email at nist.gov
Yongkang LiuFDAVerified email at uwaterloo.ca
Henrik SandbergProfessor of Decision and Control Systems, KTH Royal Institute of TechnologyVerified email at kth.se
Justin RuthsAssistant Professor of Mechanical Engineering and Systems Engineering, UT DallasVerified email at utdallas.edu
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Mustafa Amir FaisalProcter and GambleVerified email at pg.com
Jairo GiraldoResearch Assistant Professor, University of UtahVerified email at utah.edu
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Junia ValenteBlackBerry - CylanceVerified email at cylance.com
Jeanne QuimbyNational Institute of Standard and TechnologyVerified email at nist.gov
Keith StoufferNational Institute of Standards and TechnologyVerified email at nist.gov
Sebti Foufou, PhDProf. of Computer Science, University of Burgundy, FranceVerified email at u-bourgogne.fr
Nader MoayeriNational Institute of Standards and TechnologyVerified email at nist.gov
Zhibo PangABB Corporate Research, SwedenVerified email at se.abb.com
Shuvra S. BhattacharyyaProfessor of Electrical and Computer Engineering, University of MarylandVerified email at umd.edu
Sajal BhatiaSacred Heart UniversityVerified email at sacredheart.edu
Goncalo MartinsUniversity of Denver (USA)Verified email at du.edu
Xenofon KoutsoukosVanderbilt UniversityVerified email at vanderbilt.edu
Michele LuvisottoABB Corporate Research, SwedenVerified email at se.abb.com
Xiaolin JiangEricsson ResearchVerified email at ericsson.com