Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David LazerUniversity Distinguished Professor, Northeastern University; & Visiting Scholar, Harvard UniversityVerified email at neu.edu
Katherine OgnyanovaAssociate Professor, Rutgers UniversityVerified email at rutgers.edu
Alexi Quintana MathéNortheastern UniversityVerified email at northeastern.edu
James DruckmanNorthwestern UniversityVerified email at northwestern.edu
Roy PerlisMassachusetts General HospitalVerified email at mgh.harvard.edu
Matthew A. BaumMarvin Kalb Professor of Global Communications and Professor of Public Policy, Harvard UniversityVerified email at hks.harvard.edu
Mauricio SantillanaProfessor of Physics and Electr. and Comp. Eng., Northeastern University, and Harvard T. H. Chan SPHVerified email at northeastern.edu
Hong QuHarvardVerified email at harvard.edu
Ata Aydin UsluNortheastern UniversityVerified email at northeastern.edu
Alauna SafarpourGettysburg CollegeVerified email at gettysburg.edu
Matthew SimonsonThe Hebrew University of JerusalemVerified email at mail.huji.ac.il
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
Brennan KleinAssociate Research Scientist, Northeastern UniversityVerified email at northeastern.edu
Ivan FlechaisUniversity of OxfordVerified email at cs.ox.ac.uk
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk