Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Sean SmithProfessor of Computer Science, Dartmouth CollegeVerified email at cs.dartmouth.edu
- Meredith L. PattersonSpecial CircumstancesVerified email at special-circumstanc.es
- David KotzDartmouth CollegeVerified email at dartmouth.edu
- Travis GoodspeedVerified email at radiantmachines.com
- Ira Ray JenkinsDartmouth CollegeVerified email at cs.dartmouth.edu
- Ryan SpeersRiver Loop SecurityVerified email at riverloopsecurity.com
- Julian BangertGoogleVerified email at google.com
- Prashant AnantharamanSenior Security Researcher at Narf IndustriesVerified email at narfindustries.com
- Igor PakDepartment of Mathematics, UCLAVerified email at math.ucla.edu
- Gregory ContiPrincipal, Kopidion CybersecurityVerified email at usma.edu
- J Peter BradyGraduate Student, Dartmouth CollegeVerified email at cs.dartmouth.edu
- Javed AslamProfessor, Khoury College of Computer Sciences, Northeastern UniversityVerified email at ccs.neu.edu
- Cory CorneliusIntel LabsVerified email at intel.com
- Joshua BrodyAssociate Professor, Swarthmore CollegeVerified email at cs.swarthmore.edu
- Ralph WeischedelSenior Supvervisory Computer Scientist, USC Information Sciences InstituteVerified email at isi.edu
- Keren TanFacebook Inc.Verified email at fb.com
- Daniela RusAndrew (1956) and Erna Viterbi Professor of Computer Science, MITVerified email at csail.mit.edu
- Ross KoppelUniversity of PennsylvaniaVerified email at sas.upenn.edu
- Sameed AliDartmouth CollegeVerified email at dartmouth.edu
- Jim BlytheComputer Scientist, USC Information Sciences InstituteVerified email at isi.edu