Get my own profile
Public access
View all5 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Peter HawrylakAssociate Professor, Electrical and Computer Engineering, The University of TulsaVerified email at utulsa.edu
- Mauricio PapaUniversity of TulsaVerified email at utulsa.edu
- George LouthanUniversity of OklahomaVerified email at savetheband.net
- Michael HaneyAssociate Professor of Cybersecurity and Computer Science, University of IdahoVerified email at utulsa.edu
- Sandip SenProfessor, Computer Science, University of TulsaVerified email at utulsa.edu
- Stephen TyreeNVIDIAVerified email at nvidia.com
- Kyle CookThe University of TulsaVerified email at utulsa.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
- Vincent C. HuNISTVerified email at nist.gov
- Aleks KissingerAssociate Professor, University of OxfordVerified email at cs.ox.ac.uk
- Charles Wood, Ph.D.Professor of Marketing, University of TulsaVerified email at utulsa.edu
- Matthew Matlock, MD PhDResident, Emergency Medicine, Washington University in St LouisVerified email at wustl.edu
- Matthew L. HaleUniversity of Nebraska at OmahaVerified email at unomaha.edu
- Jeremy DailyAssociate Professor of Systems Engineering, Colorado State UniversityVerified email at colostate.edu
- Stephen MagillSonatype, Inc.Verified email at sonatype.com
- Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
- Christopher J MarkiewiczStanford UniversityVerified email at stanford.edu