Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

Filters

Lujo Bauer

Lujo Bauer

Professor, Electrical and Computer EngineeringCarnegie Mellon University

Lujo Bauer's research examines many aspects of computer security and privacy.

IoT Security and PrivacyNetwork SecurityCybersecurity and PrivacyInternet of Things (IoT)AI and ML for Security
Raheem Beyah

Raheem Beyah

VP Interdisciplinary Research, professor, Electrical and Computer EngineeringGeorgia Tech - COE

Raheem Beyah is an expert in the intersection of the networking and security fields.

Energy Grid SecurityNetwork SecurityCyber-physical systems securityPrivacyNetwork Monitoring and Performance
Joel Lessem

Joel Lessem

CEO and Co-FounderFirmex Inc.

This CEO has a firm grasp on data storage solutions that assist businesses and organizations in improving productivity

Cloud Computing and Data StorageEntreprenuershipStart-UpsSocial EnterpriseSales Presentations
Dr. Akramul Azim

Dr. Akramul Azim

Assistant Professor, Faculty of Engineering and Applied ScienceUniversity of Ontario Institute of Technology

Computer science expert, exploring the advantages of state-based communication scheduling and network code in real-time systems

Yvon Audette

Yvon Audette

Partner, Advisory Services, Management ConsultingKPMG

Information Technology specialist with a proven reputation for assisting clients across multiple industries improve their IT organization

It Cost OptimizationIt Due Diligence and Integration/SeparationIt StrategyGreen ITIt-Enabled Business Transformation
Brian Gunter

Brian Gunter

Assistant Professor, Aerospace EngineeringGeorgia Tech - COE

Brian Gunter's research activities involve various aspects of spacecraft missions and their applications.

Flight Mechanics and ControlSystems Design and Optimization
Eyuphan Bulut, Ph.D.

Eyuphan Bulut, Ph.D.

Associate ProfessorVCU College of Engineering

Professor Bulut's research interests include wireless networks and mobile computing, cyber-physical systems, and social networks

Applied Machine Learning with Sensor Data and Wireless SignalsMobile Computing: Wireless Networks Cyber-physical Systems Mobile Social Networks Wireless ChargingSecurity: Cyber Security Network Security Privacy and TrustMobile (3G/4G) Systems: Mobile Packet Core Cloud Mobile Data OffloadingInternet of Things (IoT), Unmanned Aerial Vehicles (UAVs), Wireless Sensing
Kimberly Young

Kimberly Young

Director, Masters in Strategic Leadership and Professor of ManagementSt. Bonaventure University

Founder and Director at Center for Internet Addiction Recovery

TeachingHigher EducationClinicalInternet AddictionInternet Gaming Addiction
Michael Nowatkowski, PhD

Michael Nowatkowski, PhD

Professor; Director, AU Cyber InstituteAugusta University

A leading cybersecurity expert available to discuss online security, ransomware, and device security topics.

Hardware and Embedded SystemsCellular and Mobile TechnologyDefensive Cyber OperationsCyber Operations EducationTCP/IP Protocol Analysis
Hoda Heidari

Hoda Heidari

Assistant ProfessorCarnegie Mellon University

Hoda Heidari is broadly interested in the Ethical and Societal Aspects of Artificial Intelligence and Machine Learning.

ElectionsFairness and AccountabilityArtificial IntelligenceEthicsMachine Learning