Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stephen F BushGE ResearchEmail verificata su research.ge.com
- Yuan HongUniversity of ConnecticutEmail verificata su uconn.edu
- Ersin DincelliAssistant Professor of Information Systems | University of Colorado DenverEmail verificata su ucdenver.edu
- Merrill WarkentinJames J. Rouse Endowed Professor of Information Systems, Mississippi State UniversityEmail verificata su msstate.edu
- Jagdish GangollyAssociate Professor Emeritus of InformaticsEmail verificata su albany.edu
- Vagelis PapakonstantinouProfessor, Faculty of Law & Criminology, Vrije Universiteit BrusselEmail verificata su vub.be
- S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaEmail verificata su virginia.edu
- Haibing LuSanta Clara UniversityEmail verificata su scu.edu
- Nicholas RizzoUniversity at AlbanyEmail verificata su albany.edu
- Prabhat HajelaRensselaer Polytechnic InstituteEmail verificata su rpi.edu
- Panagiotis KarrasProfessor, University of CopenhagenEmail verificata su di.ku.dk
- Jaideep VaidyaDistinguished Professor, Rutgers UniversityEmail verificata su business.rutgers.edu
- Justin Scott GiboneyBrigham Young UniversityEmail verificata su byu.edu
- Joseph S. ValacichMuzzy Endowed Chair, The University of ArizonaEmail verificata su arizona.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanEmail verificata su bentley.edu
- Paul MiesingUniversity at Albany, State University of New York - EmeritusEmail verificata su albany.edu
- Hwee-Joo Kam, D.Sc., CISSPAssociate Professor of Cybersecurity, University of TampaEmail verificata su ut.edu
- Nic DePaulaWayne State UniversityEmail verificata su wayne.edu
- Raouf BoutabaProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Scott EvansPrincipal Scientist Machine Learning, GE ResearchEmail verificata su ge.com