Crea il mio profilo
Accesso pubblico
Visualizza tutto39 articoli
8 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Guohong CaoProfessor, the Pennsylvania State UniversityEmail verificata su cse.psu.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Sanjeev SetiaDepartment of Computer Science, George Mason UniversityEmail verificata su gmu.edu
- Dinghao WuPennsylvania State UniversityEmail verificata su psu.edu
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaEmail verificata su samsung.com
- Thomas La PortaPenn State UniversityEmail verificata su cse.psu.edu
- Heng XuProfessor of Management, Warrington College of Business, University of FloridaEmail verificata su ufl.edu
- Daojing HeSchool of Computer Science and Engineering, South China University of TechnologyEmail verificata su scut.edu.cn
- Yu ChenProfessor at Dept. of Electrical & Computer Engr, Binghamton University, SUNYEmail verificata su binghamton.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- Peng NingGoogleEmail verificata su google.com
- Wensheng ZhangAssociate Professor of Computer Science, Iowa State UniversityEmail verificata su iastate.edu
- Qinghua LiAssociate Professor, University of ArkansasEmail verificata su uark.edu
- Wei XUPalo Alto NetworksEmail verificata su paloaltonetworks.com
- Yilu ZhouAssociate Professor of Business, Fordham UniversityEmail verificata su fordham.edu
- Lannan Lisa LuoDepartment of Computer Science, George Mason UniversityEmail verificata su gmu.edu
- Jiang MingTulane UniversityEmail verificata su tulane.edu
- Alem H Fitwi (PhD)Meta(Facebook)Email verificata su fb.com
- Jiqiang LiuProfessor of Computer ScienceEmail verificata su bjtu.edu.cn