Get my own profile
Public access
View all68 articles
20 articles
available
not available
Based on funding mandates
Co-authors
- Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
- Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
- X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
- Claudio BettiniUniversitą degli Studi di MilanoVerified email at unimi.it
- Stefano ParaboschiProfessor of Computer Science and Engineering, Universitą degli Studi di Bergamo, ItalyVerified email at unibg.it
- Sara ForestiUniversita' degli Studi di MilanoVerified email at unimi.it
- Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
- Steven NoelCybersecurity Researcher, The MITRE CorporationVerified email at mitre.org
- Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
- Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
- Peng NingGoogleVerified email at google.com
- Paul AmmannAssociate Professor of Computer Science, George Mason UniversityVerified email at gmu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
- Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
- Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it