The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2007 vol.5)
pp: 6-7
Published by the IEEE Computer Society

    Khalil Abuosba, The Arab Academy for Banking & Financial Sciences

    Alessandro Acquisti, Carnegie Mellon University

    Benjamin Adida, MIT

    Heather Adkins, Google

    Pedram Amini, 3Com

    Robert Anderson, RAND

    Zoe Antoniou, Nokia Research Centre

    Iván Arce, Core Security Technologies

    Eduardo Arias, Core Security Technologies

    Michael Baentsch, IBM Zurich Research Laboratory

    Clifford Bergman, Iowa State University

    Matthew Bishop, University of California, Davis

    Jeremy Blum, The George Washington University

    Nathaniel S. Borenstein, University of Michigan

    Stephen Boyer, MIT

    Paula Bruening, Center for Democracy and Technology

    Nicolas Brulez, Websense

    James Butler, HBGary

    Ji-Won Byun, Purdue University

    L. Jean Camp, Indiana University

    Anirban Chakrabarti, Infosys Technologies

    David Chapin, IBM

    Scott Chase, SI Government Solutions

    Vivek Chudgar, Foundstone

    Kihyun Chung, Ajou University

    Piotr Cofta, British Telecom

    Zhu Congxu, Central South University

    Jason Crampton, University of London

    Lorrie Faith Cranor, Carnegie Mellon University

    Jason Crawford, IBM T.J. Watson Research Center

    Michel Cukier, University of Maryland

    Jim Davis, Iowa State University

    Rachna Dhamija, Harvard University

    Christos Dimitriadis, University of Piraeus

    Ronald C. Dodge, US Military Academy

    Maximillian Dornseif, University of Mannheim

    Julia Earp, North Carolina State University

    Jeremy Epstein, webMethods

    Glenn Fink, Virginia Polytechnic Institute and State University

    Halvar Flake, Sabre Security

    Evangelos Floros, National and Kapodistrian University of Athens

    Richard Ford, Florida Institute of Technology

    Tiffany Frazier, BAE Systems

    Kevin Fu, University of Massachusetts

    Simson Garfinkel, MIT

    Jeong Geun, Honam University

    Steven Gribble, University of Washington

    John Linwood Griffin, Carnegie Mellon University

    Richard Guida, Johnson & Johnson

    J. Alex Halderman, Princeton University

    Eric Heitzman, Foundstone

    Lance Hoffman, George Washington University

    Thorsten Holz, University of Mannheim

    Chris Hoofnagle, University of California Law School

    Chuck Howell, MITRE

    Andrew "Bunnie" Huang, MIT

    Patrick Hung, University of Ontario Institute of Technology

    Sadiq Hussain, Majan University College

    Vinay Igure, University of Virginia

    Cynthia Irvine, US Naval Postgraduate School

    Venkatesh Iyer, Intertwingle Research

    Collin Jackson, Stanford University

    Steve Kent, BBN Technologies

    Angelos Keromytis, Columbia University

    David Kotz, Dartmouth College

    Christopher Kruegel, University of California, Santa Barbara

    Nir Kshetri, University of North Carolina, Greensboro

    Markus Kuhn, University of Cambridge

    George Kuk, Nottingham University Business School

    Susan Landau, Sun Microsystems

    Michael Lavine, Johns Hopkins University

    Tony Lee, Microsoft

    Barry Leiba, IBM

    John R. Levine, Taughannock Networks

    Elias Levy, Symantec

    Peter McLaughlin, Cardinal Health

    Manish Mehta, University of Missouri, Kansas City

    Wayne Meitzler, Pacific Northwest National Laboratory

    Eduardo Mena, University of Zaragoza

    Nirup Menon, University of Texas at Dallas

    Tom Messerges, Motorola Labs

    David Moore, CAIDA

    Kathleen Moriarty, MIT

    Steven Myers, Indiana University

    Jose Nazario, Arbor Networks

    David Ngo, Multimedia University

    Jeffrey Ober, King's College/Nova Southeastern University

    Rolf Oppliger, eSECURITY Technologies

    Xinming Ou, Purdue University

    Andy Ozment, Cambridge University

    Partha Pal, BBN Technologies

    Panos Papadimitratos, École Polytechnique Fédérale de Lausanne

    Donn Parker, Retired

    Cyrus Peikari, Airscanner

    Sean Peisert, University of California, San Diego

    Adrian Perrig, Carnegie Mellon University

    Charles Pfleeger, Pfleeger Consulting Group

    Linda Pistole, North Carolina State University

    Niels Provos, Google

    Antonio Puliafito, University of Messina

    Danny Quist, Los Alamos National Lab

    Wei Ren, University of Nevada, Las Vegas

    Gerardo Richarte, Core Security Technologies

    George Roussos, University of London

    Avi Rubin, Johns Hopkins University

    Tomas Sander, International Computer Science Institute

    Altair Santin, Pontifical Catholic University of Paraná

    Sami Saydjari, Cyber Defense Agency

    Stuart Edward Schechter, MIT

    Gregg Schudel, Cisco

    Richard Segal, IBM

    Frank Siebenlist, Argonne National Laboratory

    Sankalp Singh, University of Illinois

    Jonathan M. Smith, Darpa

    Theodore Stergiou, City University, Athens

    Susan Straus, RAND

    Ahren Studer, MIT

    Martin Stytz, Institute for Defense Analysis

    Peter Szor, Symantec

    Gregg Tally, Sparta

    Paul Thompson, Dartmouth College

    Giovanni Vigna, University of California, Santa Barbara

    Arno Wagner, ETH Zurich

    Ariel Waissbein, Universidad de Buenos Aires / Core Security Technologies

    Aaron Walters, Purdue University/CERIAS

    Guiling Wang, Pennsylvania State University

    Tim Weil, EF Kearney

    Steve Weingart, Gulf Stream

    Von Welch, US National Center for Supercomputing Applications

    Gregory White, The University of Texas at San Antonio

    Stan Wisseman, Booz, Allen, & Hamilton

    Gaoxi Xiao, Nanyang Technological University

    Nick Xie, Carniege Mellon University

    Yuan Xue, Vanderbilt University

    Angelos Yannopoulos, National Technical University of Athens

    Kenji Yoshihira, NEC Labs

    Stefano Zanero, Politecnico di Milano

    Dave Zubrow, Software Engineering Institute

    Nevenko Zunic, IBM

16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool