Original language | English (US) |
---|---|
Article number | 8886898 |
Pages (from-to) | 77-83 |
Number of pages | 7 |
Journal | IEEE Security and Privacy |
Volume | 17 |
Issue number | 6 |
DOIs | |
State | Published - Nov 1 2019 |
Bibliographical note
Funding Information:We would like to thank all of the hackathon participants. This work was supported in part by the U.S. Department of Defense under Centers for Academic Excellence grants H98230-15-1-0294, H98230-15-1-0273, H98230-17-1-0349, and H98230-17-1-0347; the National Science Foundation under Scholarship for Service grant 1241576; and the Department of Graduate Education grant 1820531.
Funding Information:
We would like to thank all of the hackathon participants. This work was supported in part by the U.S. Department of Defense under Centers for Academic Excellence grants H98230-15-1-0294, H98230- 15-1-0273, H98230-17-1-0349, and H98230-17-1-0347; the National Science Foundation under Scholar ship for Service grant 1241576; and the Department of Graduate Educa tion grant 1820531.