Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- David LazerUniversity Distinguished Professor, Northeastern University; & Visiting Scholar, Harvard UniversityVerified email at neu.edu
- Katherine OgnyanovaAssociate Professor, Rutgers UniversityVerified email at rutgers.edu
- Alexi Quintana MathéNortheastern UniversityVerified email at northeastern.edu
- James DruckmanNorthwestern UniversityVerified email at northwestern.edu
- Roy PerlisMassachusetts General HospitalVerified email at mgh.harvard.edu
- Matthew A. BaumMarvin Kalb Professor of Global Communications and Professor of Public Policy, Harvard UniversityVerified email at hks.harvard.edu
- Mauricio SantillanaProfessor of Physics and Electr. and Comp. Eng., Northeastern University, and Harvard T. H. Chan SPHVerified email at northeastern.edu
- Hong QuHarvardVerified email at harvard.edu
- Ata Aydin UsluNortheastern UniversityVerified email at northeastern.edu
- Alauna SafarpourGettysburg CollegeVerified email at gettysburg.edu
- Matthew SimonsonThe Hebrew University of JerusalemVerified email at mail.huji.ac.il
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Brennan KleinAssociate Research Scientist, Northeastern UniversityVerified email at northeastern.edu
- Ivan FlechaisUniversity of OxfordVerified email at cs.ox.ac.uk
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk