Get my own profile
Public access
View all31 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Michael IannaconeOak Ridge National LabVerified email at ornl.gov
- John GoodallOak Ridge National LaboratoryVerified email at ornl.gov
- Samuel HollifieldCybersecurity Researcher, Oak Ridge National LaboratoryVerified email at ornl.gov
- Stacy ProwellComputer Science Department, Tennessee Technological UniversityVerified email at tntech.edu
- Sean OeschCybersecurity Researcher, Oak Ridge National LaboratoryVerified email at ornl.gov
- Pablo MorianoResearch Scientist, Oak Ridge National LaboratoryVerified email at ornl.gov
- Katerina Goseva PopstojanovaProfessor of Computer Science, West Virginia UniversityVerified email at mail.wvu.edu
- Jarilyn M. Hernández JiménezBAE Systems / WVUVerified email at mix.wvu.edu
- Justin M. BeaverDistinguished Research Fellow, Lirio LLCVerified email at lirio.com
- Chad A. SteedOak Ridge National LaboratoryVerified email at acm.org
- Eric RaganUniversity of FloridaVerified email at ufl.edu
- Samantha ErwinSenior Data Scientist & Team Lead at Pacific Northwest National LabVerified email at pnnl.gov
- Anthony GruberJohn von Neumann Fellow, Sandia National LaboratoriesVerified email at sandia.gov
- Sheikh Rabiul IslamRutgers University - CamdenVerified email at rutgers.edu
- Christopher HarshawPostdoctoral Fellow, UC BerkeleyVerified email at yale.edu
- Craig MilesOffensive Security Research, AmazonVerified email at craigmil.es
- Zachariah TyreeDelphai InsightsVerified email at delphai-insights.com
- Guenevere (Qian) ChenAssociate Professor, Electrical and Computer Engineering, The University of Texas at San AntonioVerified email at utsa.edu
Follow
Robert A. Bridges
Research Mathematician, Oak Ridge National Laboratory
Verified email at ornl.gov - Homepage