Get my own profile
Public access
View all68 articles
20 articles
available
not available
Based on funding mandates
Co-authors
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
Claudio BettiniUniversità degli Studi di MilanoVerified email at unimi.it
Sara ForestiUniversita' degli Studi di MilanoVerified email at unimi.it
Stefano ParaboschiProfessor of Computer Science and Engineering, Università degli Studi di Bergamo, ItalyVerified email at unibg.it
Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Steven NoelCybersecurity Researcher, The MITRE CorporationVerified email at mitre.org
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
Peng NingGoogleVerified email at google.com
Paul AmmannAssociate Professor of Computer Science, George Mason UniversityVerified email at gmu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it