Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nathaniel D. BastianUnited States Military AcademyVerified email at westpoint.edu
- Edward SobieskProfessor, EECS, United States Military AcademyVerified email at westpoint.edu
- Jean BlairDistinguished Professor of Innovation and Professor of Computer Science, United States MilitaryVerified email at westpoint.edu
- Michael C. FuUniversity of MarylandVerified email at umd.edu
- Brian J. LundayProfessor of Operations Research, Air Force Institute of TechnologyVerified email at afit.edu
- Fernando MaymiIronNet Cybersecurity, Inc.Verified email at maymi.net
- Prof. Inbal YahavColler School of ManagementVerified email at tauex.tau.ac.il
- John SilberholzAssistant Professor, University of MichiganVerified email at umich.edu
- Ritvik SahajpalDepartment of Geographical Sciences, University of Maryland College ParkVerified email at umd.edu
- Bruce L. GoldenProfessor, University of MarylandVerified email at umd.edu
- Michael J. Kwinn, Jr.Professor of Systems Engineering, US Military AcademyVerified email at usma.edu
- Diane R. MurphyMarymount UniversityVerified email at marymount.edu
- Xiang Michelle LiuMarymount UniversityVerified email at marymount.edu
- Scott NestlerUniversity of Notre DameVerified email at nd.edu
- Michael NowatkowskiSchool of Computer and Cyber Sciences at Augusta UniversityVerified email at augusta.edu
- Lubjana BeshajThe United States Military AcademyVerified email at westpoint.edu
- Brian NussbaumAssistant Professor CEHC, University at AlbanyVerified email at albany.edu
- Ashok DebUniversity of Southern CaliforniaVerified email at usc.edu
- Karl WimmerAssociate Professor of Mathematics, Duquesne UniversityVerified email at duq.edu
- Brooks EmerickAssociate Professor of Mathematics, Kutztown UniversityVerified email at kutztown.edu