Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

Filters

Samantha Bradshaw

Samantha Bradshaw

Doctor of Philosophy CandidateOxford Internet Institute

Samantha Bradshaw is a D. Phil. candidate at the Oxford Internet Institute, working on the Computational Propaganda project.

GovernmentInternet GovernanceCyber SecuritySocial Media and DemocracyComputational Propaganda
Robert (B.J.) Johnson

Robert (B.J.) Johnson

Clinical Associate Professor of Computer ScienceLoyola Marymount University

Seaver College of Science and Engineering

Software EngineeringComputer ScienceAgile DevelopmentComputer Systems OrganizationOperating Systems
Kurt Rohloff

Kurt Rohloff

Associate Professor, Computer ScienceNew Jersey Institute of Technology

Professor Rohloff focuses on encrypted computing, homomorphic encryption, lattice-based and applied cryptography and cybersecurity

Contact TracingSoftware EngineeringCryptography Computer Security and PrivacyCybersecurityCryptography
Taghi Khoshgoftaar, Ph.D.

Taghi Khoshgoftaar, Ph.D.

Motorola ProfessorFlorida Atlantic University

Taghi Khoshgoftaar researches computer security and intrusion detection systems.

Computer Security and Intrusion Detection SystemsSoftware EngineeringMachine LearningData MiningBig Data Analytics
Tom Holt

Tom Holt

Professor of Criminal JusticeMichigan State University

Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher

TerrorMalwareInformation WarfareCybercrimeIdentity Theft
Ian Sutcliffe

Ian Sutcliffe

PartnerSutcliffe & Associates, Management Consultants

Highly rated business speaker and entrepreneur who conects strategy to execution

Service Quality - Driving Satisfaction & ProfitabilityWeb 2.0 Strategies and Tactics That WorkLinking Social Media and ProfitabilityEffective Relationship Marketing for Technology CompaniesMarketing Performance - Be Where the Customer Is
Golden Richard III

Golden Richard III

ProfessorLouisiana State University

Dr. Richard has over 45 years of practical experience in computer security and is a devoted advocate for applied cybersecurity education.

CybersecurityDigital ForensicsMemory ForensicsReverse Engineering Malware Analysis