Robin Gandhi

Profile Picture of Robin Gandhi
Title
Associate Professor of Cybersecurity
Department
School of Interdisciplinary Informatics
Institution
University of Nebraska - Omaha

Education

  • PhD in IT University of North Carolina at Charlotte

Research Interests

Information Security   Software Licensing, Software Licenses   Software Assurance  

  View all research interests

Biography

Not mentioned yet

Homepages

Contact Information

Not mentioned yet.
Research
Not mentioned yet. (?)
List of Publications (68)
In 2023
68

Conference Harrasi, A. A., Grispos, G., & Gandhi, R. (2023). Using Cybersecurity Testbeds to Evaluate (In)Secure Structural Health Monitoring Systems. Proceedings of the 20th International ISCRAM Conference (pp. 902-908). Omaha, USA: University of Nebraska at Omaha.

Found on Publication Page
67

Conference Ramsey, A., Kale, A., Kassa, Y., Gandhi, R., & Ricks, B. (2023). Toward Interactive Visualizations for Explaining Machine Learning Models. Proceedings of the 20th International ISCRAM Conference (pp. 837-852). Omaha, USA: University of Nebraska at Omaha.

Found on Publication Page
In 2021
66

Journal Germonprez, M., Gandhi, R. A., & Link, G. (2021). The Routinization of Open Source Project Engagement: The Case of Open Source Risk Management Routines. Communications of the Association for Information Systems, 49, pp-pp. https://doi.org/10.17705/1CAIS.04938

Found on Publication Page
65

Journal Kale, A., Ricks, B., & Gandhi, R. (2021) New Measure to Understand and Compare Bridge Conditions Based on Inspections Time-Series Data. Journal of infrastructure systems, doi:10.1061/(ASCE)IS.1943-555X.0000633.

Found on Publication Page
In 2020
64

Journal Avande, M. Gandhi, R., Siy, H., (2020) Understanding User Engagement With Multi-Representational License Comprehension Interfaces, IJOSSP: Volume 11, Issue 4, Article 2, December 2020.

Found on Publication Page
In 2019
63

Journal Mandal, S., Gandhi, R. & Siy, H. Modular norm models: practical representation and analysis of contractual rights and obligations, Requirements Eng. (2019). https://doi.org/10.1007/s00766-019-00323-y (Impact Factor 2.761) Accepted 26 July 2019, First Online 05 August 2019.

Found on Publication Page
In 2018
62

Conference Gandhi, R., Germonprez, R. M., Link, G. (Graduate), (2018). Open Data Standards for Open Source Software Risk Management Routines: An Examination of SPDX, ACM GROUP 2018, pp. 219-229

Found on Publication Page
61

Journal Tobey, D. H., Gandhi, R., Watkins, A. B., Casey, O. W., (2018). Competency is Not a Three Letter Word: A Glossary Supporting Competency-based Instructional Design in Cybersecurity, Cybersecurity Skills Journal: Practice and Research

Found on Publication Page
60

Conference Gandhi, R., Khazanchi, D., Linzell, D., Ricks, B., Sim, C., (2018). The Hidden Crisis: Developing Smart Big Data pipelines to address Grand Challenges of Bridge Infrastructure health in the United States, ISCRAM 2018 Conference Proceedings - 15th International Conference on Information Systems for Crisis Response and Management, pp. 1016-1021

Found on Publication Page
In 2017
59

Conference Mandal, S. (Graduate), Gandhi, R., Siy, H., (2017). Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal, 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2017), Orlando, Florida, Nov 16-10, 2017.

Found on Publication Page
58

Research Data Product Chungwook Sim; Robin Gandhi; David M Gee; Ajay Khampariya; Akshay Kale; Dreizan Moore (2017), "Nebraska Bridge Data," Data Center Hub https://datacenterhub.org/resources/14392.

Found on Publication Page
In 2016
57

Research Software Product Germonprez, R. M., Gurney, T., Uday Shankar Korlimarla, S., Gandhi, R. (2016). DoSOCS: A System for SPDX 2.0 Document Creation and Storage. The Journal of Open Source Software, 1(7). http://dx.doi.org/10.21105/joss.00038

Found on Publication Page
56

Technical Report Gandhi, R. (2016). In NIST 800-160 Systems Security Engineering (Ed.), Appendix I: Software Assurance Considerations in the Systems Security Engineering Lifecycle. Washington D.C.: NIST. csrc.nist.gov/publications/drafts/800-160/sp800_160_second-draft.pdf

Found on Publication Page
55

Journal Gandhi, R., Crosby, K., Siy, H., Mandal, S. (Graduate), (2016). Driving Secure Software Initiatives Using FISMA: Issues and Opportunities, Crosstalk: The Journal of Defense Software Engineering, vol. 29 (1), pp. 37-41

Found on Publication Page
54

Workshop Mandal, S. (Graduate), Gandhi, R., Siy, H., (2016). Can I Copy this Code? Extracting Norms from Software Licenses using Frame Semantics, Workshop on the Naturalness of Software in conjunction with International Symposium on the Foundations of Software Engineering

Found on Publication Page
53

Patent Issued, Co-inventors: Gandhi, R., Siy, H., Crosby, K., (2016) Risk Prioritization and Management Patent No: US20140337982 A1, United States https://www.google.com/patents/US20140337982

Found on Publication Page
52

Symposium Cooper, K. M., Bastola, D., Gandhi, R., Ghersi, D., Hinrichs, S., Morien, M., Fruhling, A. L., (2016). Forecasting the Spread of Mosquito-Borne Disease using Publicly Accessible Data: A Case Study in Chikungunya, AMIA 2016 Annual Symposium

Found on Publication Page
In 2015
51

Journal Claus, B., Gandhi, R.A., Rawnsley, J., Crowe, J., (2015) Using the Oldest Military Force for the Newest National Defense, The Journal of Strategic Security, Dec 2015 Issue. (Impact factor 0.93)

Found on Publication Page
50

Workshop Mandal, S. (Graduate), Gandhi, R., Siy, H., (2015). Semantic Web Representations for Reasoning about Applicability and Satisfiability of Federal Regulations for Information Security, International Workshop on Requirements Engineering and Law (RELAW '15), at the 23rd IEEE International Conference on Requirement Engineering, August 24-28, 2015, Ottawa, Canada. pp. 1-9. Best Paper Award.

Found on Publication Page
49

Conference Grandgenett, R. (Graduate), Mahoney, W., Gandhi, R., (2015). Authentication Bypass and Remote Escalated I/O Command Attacks, 10th Annual Cyber and Information Security Research Conference, Oak Ridge, Best Paper Award.

Found on Publication Page
48

Published Abstract/Presentation Hale, M. L., Gandhi, R., (2015). Two perspectives on Securing Big Data at the edge, NATO NIAS Cyber Security Symposium, Mons Belgium

Found on Publication Page
In 2014
47

Journal Gandhi, R., Siy, H., Crosby, K., Mandal, S. (Graduate), (2014). Gauging the Impact of FISMA on Software Security, IEEE Computer, vol. 47 (9) (Impact factor 2.945)

Found on Publication Page
46

Journal Hemmatazad, N. (Graduate), Gandhi, R., Zhu, Q., Bhowmick, S., (2014). The Intelligent Data Brokerage: A Utility-Enhancing Architecture for Algorithmic Anonymity Measures, International Journal of Privacy and Health Information Management (IJPHIM), vol. 2 (1), pp. 22-33

Found on Publication Page
45

Published Abstract Soule, R., Tobey, D. H., and Gandhi, R. (2014). Assessing Learner Readiness for Tough Cases. Academy of Management Annual Conference, Philadelphia, PA

Found on Publication Page
44

Conference Grandgenett, R. (Graduate), Gandhi, R., Mahoney, W., (2014). Exploitation of Allen Bradley's Implementation of EtherNet/IP for Denial of Service Against Industrial Control Systems, 9th International Conference on Cyber Warfare and Security.

Found on Publication Page
In 2013
43

Journal Wu, Y., Gandhi, R., & Siy, H. (2013). Semi-Automatic Annotation of Natural Language Vulnerability Reports. International Journal of Secure Software Engineering (IJSSE), 4(3), 18-41. doi:10.4018/jsse.2013070102

Found on Publication Page
42

Conference Pedersen, J., Bastola D., Dick, K., Gandhi, R., Mahoney, M., (2013) Fingerprinting Malware Using Bioinformatics Tools Building a Classifier for the Zeus Virus, International Conference on Security and Management (SAM'13), Las Vegas, USA, July 22 - 25.

Found on Publication Page
41

Workshop Gandhi, R.A., Siy, H., Yan, Wu, (2013) Lightweight formalisation of security weaknesses, Workshop on Formal Methods in Software Engineering (FormaliSE): 25 May 2013, San Francisco (USA), in conjunction with International Conference on Software Engineering. 2013.

Found on Publication Page
In 2012
40

Book Chapters Sousan, W., Zhu, Q., Gandhi, R.A., Mahoney, W., (2012) Smart Grid Tamper Detection using Learned Event Patterns, Systems and Optimization Aspects of Smart Grid Challenges, Springer, Editors: Dr. Marco Carvalho, Vijay Pappu, Dr. Panos M. Pardalos

Found on Publication Page
39

Journal Sharma, A., Gandhi, R.A., Mahoney, W., Sousan, W., Zhu, Q., (2012) A Social Dimensional Cyber Threat Model with Formal Concept Analysis and Fact-Proposition Inference, International Journal of Information and Computer Security.

Found on Publication Page
38

Workshop Gandhi, R.A., Rahmani, M. (2012) Early Security Patterns: A Collection of Constraints to Describe Regulatory Security Requirements, RePa 2012 : Second International Workshop on Requirements Patterns, IEEE International Conference on Requirements Engineering, Chicago, Sept, 2012

Found on Publication Page
In 2011
37

Journal Mahoney, W., Gandhi, R.A., (2011) An Integrated Framework for Control System Simulation and Regulatory Compliance Monitoring, Elsevier, International Journal on Critical Infrastructure Protection (IJCIP), vol.4, no.1, April 2011, pp. 41-53, URL: http://dx.doi.org/10.1016/j.ijcip.2011.03.002.

Found on Publication Page
36

Journal Gandhi, R.A., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P., (2011) "Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political," IEEE Technology and Society, vol.30, no.1, pp.28-38, Spring 2011, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5725605&isnumber=5725598

Found on Publication Page
35

Workshop Sousan, W., Gandhi, R.A., Zhu, Q., Mahoney, W., (2011) Using Anomalous Event Patterns in Control Systems for Tamper Detection, 7th Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge National Laboratory, Oak Ridge, TN, 2011.

Found on Publication Page
34

Journal Gandhi, R.A., Lee, S.W. (2011) Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk. ACM Transactions on Software Engineering Methodology 20, 4, Article 16 (September 2011), 37 pages. URL: http://doi.acm.org/10.1145/2000799.2000802,

Found on Publication Page
33

Conference Wertzberger, N., Glatter, C., Mahoney, W., Gandhi, R.A., Dick, K., (2011) Towards a Low-Cost SCADA Test Bed: An Open-Source Platform for Hardware-in-the-Loop Simulation, The 2011 International Conference on Security and Management, Special Track on Mission Assurance and Critical Infrastructure Protection (STMACIP'11), Las Vegas, Nevada, 2011.

Found on Publication Page
32

Conference Wu, Y., Siy, H., Gandhi, R.A., (2011) Empirical Results on the Study of Software Vulnerabilities (NIER Track). In proceedings of the 33rd International Conference on Software Engineering (ICSE 2011), Waikiki, Honolulu, Hawaii, May 21-28, 2011, ACM, New York, NY, USA, pp.964-967, URL: http://doi.acm.org/10.1145/1985793.1985960

Found on Publication Page
In 2010
31

Conference Sharma, A., Gandhi, R.A., Mahoney, W., Sousan, W., Zhu, Q., (2010) Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks, Social Computing (SocialCom), IEEE International Conference on Privacy, Security, Risk and Trust, pp. 981-986, URL: http://www.computer.org/portal/web/csdl/doi/10.1109/SocialCom.2010.145

Found on Publication Page
30

Conference Walnez, B., Gandhi, R.A., Mahoney, Zhu, Q., (2010) Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities, Social Computing (SocialCom), IEEE International Conference on Privacy, Security, Risk and Trust, pp.508-512, URL: http://www.computer.org/portal/web/csdl/doi/10.1109/SocialCom.2010.80

Found on Publication Page
29

Conference Sousan, W., Gandhi, R.A., Mahoney, W., Zhu, Q., Sharma, A., (2010) Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence, Social Computing (SocialCom), IEEE International Conference on Privacy, Security, Risk and Trust, pp.967-972, 20-22 Aug. 2010, URL: http://www.computer.org/portal/web/csdl/doi/10.1109/SocialCom.2010.143

Found on Publication Page
28

Workshop Yan, W., Gandhi, R.A, and Siy, H., (2010) Using semantic templates to study vulnerabilities recorded in large software repositories. In Proceedings of the 2010 ICSE Workshop on Software Engineering For Secure Systems, at the 32nd ACM/IEEE International Conference on Software Engineering (ICSE 2010), Cape Town, South Africa, May 02 - 02, 2010. SESS/ICSE '10. ACM, New York, NY, 22-28. DOI= http://doi.acm.org/10.1145/1809100.1809104

Found on Publication Page
27

Conference Gandhi, R.A., Mahoney, W., Dick, K., and Wilson, Z., (2010) Language-driven Assurance for Regulatory Compliance of Control Systems, In Proceedings of the 5th International Conference on Information Warfare and Security, The Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA, 8-9 April 2010

Found on Publication Page
26

Book Chapters Lee, S. W., Gandhi, R. A., Park, S., (2010) Tracing Requirements, Book chapter in The Encyclopedia of Software Engineering, Taylor and Francis Group, LLC, Edited by Phillip A. Laplante, ISBN: 978-1-4200597-7-9, Publish Date: December 14th 2010

Found on Publication Page
25

Journal Gandhi, R.A., Siy, H., Wu, Y., (2010) Studying Security Vulnerabilities, CrossTalk, The Journal of Defense Software Engineering, Sept/Oct issue, pp. 16-20, URL: http://www.crosstalkonline.org/storage/issue-archives/2010/201009/201009-Gandhi.pdf

Found on Publication Page
In 2009
24

Book Chapters Gandhi, R. A., Lee, S. W., (2009) Ontology guided risk analysis: from informal specifications to formal metrics. Advances in Information and Intelligent Systems, Studies in Computational Intelligence, 2009, Volume 251/2009, 227-249, DOI: 10.1007/978-3-642-04141-9_11 (http://www.springer.com/series/7092; http://www.springerlink.com/content/f17221quu3077758/)

Found on Publication Page
23

Workshop Cooper, J, Lee, S.W., Gandhi, R.A., Gotel, O., (2009) Requirements Engineering Visualization: A Survey on the State-of-the-Art, In Proceedings of the Fourth International Workshop on Requirements Engineering Visualization (REV'09), at the 17th International IEEE Conference on Requirements Engineering, Atlanta, Georgia, USA.

Found on Publication Page
22

Conference Gandhi, R.A., Mahoney, W., Dick, K. (2009) ADACS - A Language for Monitoring Regulatory Compliance in Control Systems, In Proceedings of the 2nd Workshop on Compiler and Architectural Techniques for Application Reliability and Security at the 39th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), Lisbon, Portugal.

Found on Publication Page
21

Conference Gandhi R.A. and Lee, S.W., (2009) Assurance Case driven Case Study Design in Requirements Engineering Research, In: 15th International Conference on Requirements Engineering: Foundations for Software Quality, REFSQ 2009. LNCS Springer.

Found on Publication Page
20

Journal Lee, S.W, Gandhi R.A., Wagle, S.J. (2009) Ontology Guided Service -Oriented Architecture Composition to Support Complex and Tailorable Process Definitions. In the International Journal of Software Engineering and Knowledge Engineering, Vol. 19, Issue 6, 2009, p. 791-821, DOI: 10.1142/S0218194009004386.

Found on Publication Page
In 2007
19

Journal Lee, S. W., Gandhi, R. A., and Ahn, G. (2007) Certification Process Artifacts Defined as Measurable Units for Software-intensive Systems Lifecycle, International Journal on Software Process: Improvement and Practice, 12(2), pp. 165-189, John Wiley & Sons, Ltd., DOI: http://dx.doi.org/10.1002/spip.313.

Found on Publication Page
18

Conference Gandhi, R.A., Lee, S.W. (2007) Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment, In Proceedings of the 15th IEEE International Requirements Engineering Conference (RE 07), October 15-19, Delhi, India, pp. 231-240, (Acceptance ratio 35/172 20%), URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4384186&isnumber=4384150

Found on Publication Page
17

Workshop Gandhi, R.A., Lee, S.W. (2007) Visual Analytics for Requirements-driven Risk Assessment, In Proceedings of the 2nd International Workshop on Requirements Engineering Visualization (REV 07) at the 15th IEEE International Requirements Engineering Conference (RE 07), October 15-19, Delhi, India, 2007, pp: 6-12, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4473006&isnumber=4473000

Found on Publication Page
16

Workshop Lee, S.W, Gandhi R.A., Wagle, S.J. (2007) Towards Requirements-driven Workbench for Supporting Software Certification and Accreditation, In Proceedings of the 3rd International Workshop on Software Engineering for Software Systems (SESS 07), at the 29th International Conference on Software Engineering (ICSE 07), Minneapolis, MN, USA, URL: http://dx.doi.org/10.1109/ICSEW.2007.212

Found on Publication Page
In 2006
15

Journal Lee, S. W., Muthurajan, D., Gandhi, R. A., Yavagal, D., and Ahn, G. (2006) Building Decision Support Problem Domain Ontology from Security Requirements to Engineer Software-intensive Systems, International Journal on Software Engineering and Knowledge Engineering, 16(6), pp.851-884, World Scientific Publishing Company. URL: http://dx.doi.org/10.1142/S0218194006003051

Found on Publication Page
14

Journal Lee, S. W., and Gandhi, R. A. (2006) Requirements as Enablers for Software Assurance, CrossTalk: The Journal of Defense Software Engineering, United States Department of Defense, December, Vol. 19, No. 12, pp. 20-24, 2006, URL: http://www.stsc.hill.af.mil/CrossTalk/2006/12/0612LeeGandhi.html

Found on Publication Page
13

Workshop Gandhi, R.A., Wagle, S.J., Lee, S.W. (2006) Process Artifacts Defined as an Aspectual Service to System Models, In Proceedings of the 2nd International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER 06), 14th IEEE International Requirements Engineering Conference (RE 06), Minneapolis, MN, USA, September 11-15, 2006, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4027098&isnumber=4027091

Found on Publication Page
12

Workshop Richter, H, Gandhi, R.A., Liu, L., Lee, S.W. (2006) Incorporating Multimedia Source Materials into a Traceability Framework, In Proceedings of the 1st International Workshop on Multimedia Requirements Engineering - Beyond Mere Descriptions (MERE 06), 14th IEEE International Requirements Engineering Conference (RE 06), September 11-15, Minneapolis, USA, pp: 7-13, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4022124&isnumber=4022117

Found on Publication Page
11

Workshop Lee, S.W, Gandhi, R.A, Muthurajan, D., Yavagal, D.S., Ahn, G. (2006) Building problem domain ontology from security requirements in regulatory documents, In Proceedings of the 2nd International Workshop on Software Engineering For Secure Systems (SESS 06), at the 28th ACM/IEEE International Conference on Software Engineering (ICSE 06), Shanghai, China, May 20 - 21, ACM Press, New York, NY, pp. 43-50, DOI: http://doi.acm.org/10.1145/1137627.1137635

Found on Publication Page
In 2005
10

Conference Lee, S.W., Gandhi, R.A. (2005) Ontology-based Active Requirements Engineering Framework, In Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 05), Taipei, Taiwan, IEEE Computer Society Press, pp. 481-490, URL: http://doi.ieeecomputersociety.org/10.1109/APSEC.2005.86

Found on Publication Page
9

Workshop Lee, S.W., Gandhi, R.A., Ahn, G. (2005) Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems, In Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 05) at the 13th IEEE International Requirements Engineering Conference (RE 05), 8/29-9/2, Paris, France, IEEE Press.

Found on Publication Page
8

Workshop Lee, S.W., Gandhi, R.A. (2005) Engineering Dependability Requirements for Software-intensive Systems through the Definition of a Common Language, In Proceedings of the Workshop on Requirements Engineering for High-Availability Systems (RHAS), at the 13th IEEE International Requirements Engineering Conference (RE 05), pp. 40-48, 8/29 - 9/2, Paris, France. Software Engineering Institute (SEI), Carnegie Mellon University & IEEE Press.

Found on Publication Page
7

Workshop Lee, S.W., Gandhi, R.A (2005) Ontology-based Active Requirements Engineering Framework" Accepted to the Eleventh International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ 05), at the 17th Conference on Advanced Information Systems Engineering (CAiSE '05), June 13 - 17, Porto, Portugal.

Found on Publication Page
6

Workshop Lee, S.W., Gandhi, R.A, Ahn, G. (2005) Establishing Trustworthiness in Services of the Critical Infrastructure through Certification and Accreditation," In Proceedings of the 1st International Workshop on Software Engineering for Secure Systems (SESS 05) at the 27th IEEE International Conference on Software Engineering (ICSE 05), pp. 43-49, St. Louis, Missouri, May 15-21, URL: http://doi.acm.org/10.1145/1083200.1083205

Found on Publication Page
5

Conference Lee, S.W., Ahn, G., Gandhi, R.A. (2005) Engineering Information Assurance for Critical Infrastructures: The DITSCAP Automation Study, In Proceedings of the 15th Annual International Symposium of the International Council on Systems Engineering (INCOSE 05), - Systems Engineering, Rochester, NY, July 10-15.

Found on Publication Page
4

Conference Yavagal, D.S., Lee, S.W., Ahn, G., Gandhi, R.A. (2005) Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA), In Proceedings of the 43rd Annual ACM Southeast Conference (ACMSE 05), March 18-20, Kennesaw, Georgia, pp. 130-135, DOI: http://doi.acm.org/10.1145/1167253.1167287

Found on Publication Page
3

Conference Lee, S.W., Gandhi, R.A, Ahn, G., Yavagal, D. (2005) Active Automation of the DITSCAP, In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Atlanta, Georgia, May 19-20, 2005, A Book Chapter in Lecture Notes in Computer Science, Volume 3495, pp. 479-485, Springer, URL: http://dx.doi.org/10.1007/11427995_46

Found on Publication Page
In 2003
2

Conference Tolone, W.J., Gandhi, R.A., Ahn, G. (2003) Locale-based access control: placing collaborative authorization decisions in context, In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Vol. 5, pp. 4120- 4127, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1245632&isnumber=27913

Found on Publication Page
Unspecified
1

Journal Tobey, D. H., Gandhi, R., Assessing secure coding proficiency: Designing a concept inventory. Being developed.

Found on Publication Page
Search Profiles
Colleagues
Profile Picture of Sarah McKee
University of Nebraska - Omaha
Profile Picture of Rebecca Lutte
University of Nebraska - Omaha
Profile Picture of Kelly MacArthur
University of Nebraska - Omaha
People Also Viewed
Profile Picture of Timothy Tolentino
Georgia Southern University
Profile Picture of Adam Schaefer
Florida Atlantic University
Recommended Grants