Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

Filters

Ender Yuksel

Ender Yuksel

Postdoctoral ResearcherTechnical University of Denmark

Researcher, Computer Scientist

SecurityVerificationSensors
Robert (B.J.) Johnson

Robert (B.J.) Johnson

Clinical Associate Professor of Computer ScienceLoyola Marymount University

Seaver College of Science and Engineering

Software EngineeringComputer ScienceAgile DevelopmentComputer Systems OrganizationOperating Systems
Kurt Rohloff

Kurt Rohloff

Associate Professor, Computer ScienceNew Jersey Institute of Technology

Professor Rohloff focuses on encrypted computing, homomorphic encryption, lattice-based and applied cryptography and cybersecurity

Contact TracingSoftware EngineeringCryptography Computer Security and PrivacyCybersecurityCryptography
Taghi Khoshgoftaar, Ph.D.

Taghi Khoshgoftaar, Ph.D.

Motorola ProfessorFlorida Atlantic University

Taghi Khoshgoftaar researches computer security and intrusion detection systems.

Computer Security and Intrusion Detection SystemsSoftware EngineeringMachine LearningData MiningBig Data Analytics
Tom Holt

Tom Holt

Professor of Criminal JusticeMichigan State University

Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher

TerrorMalwareInformation WarfareCybercrimeIdentity Theft
Ian Sutcliffe

Ian Sutcliffe

PartnerSutcliffe & Associates, Management Consultants

Highly rated business speaker and entrepreneur who conects strategy to execution

Service Quality - Driving Satisfaction & ProfitabilityWeb 2.0 Strategies and Tactics That WorkLinking Social Media and ProfitabilityEffective Relationship Marketing for Technology CompaniesMarketing Performance - Be Where the Customer Is
Golden Richard III

Golden Richard III

ProfessorLouisiana State University

Expert in cybersecurity, specializing in malware analysis, reverse engineering, and digital forensics.

CybersecurityDigital ForensicsMemory ForensicsReverse Engineering Malware Analysis