Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Qiben YanComputer Science and Engineering, Michigan State UniversityEmail verificata su msu.edu
- Hamid BagheriUniversity of Nebraska-LincolnEmail verificata su mit.edu
- Clay StevensUniversity of Nebraska-LincolnEmail verificata su huskers.unl.edu
- Somesh JhaLubar Chair of Computer Science, University of WisconsinEmail verificata su cs.wisc.edu
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesEmail verificata su rmit.edu.au
- Sahel AlounehProfessor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)Email verificata su aau.ac.ae
- Xiapu LuoThe Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
- Witawas Srisa-anProfessor, School of Computing, University of Nebraska-LincolnEmail verificata su unl.edu
- Thomas RepsJ. Barkley Rosser Professor & Rajiv and Ritu Batra Chair, Comp. Sci. Dept., Univ. of WisconsinEmail verificata su cs.wisc.edu
- Earlence FernandesAssistant Professor, UC San DiegoEmail verificata su ucsd.edu
- Andrei SabelfeldChalmers University of TechnologyEmail verificata su chalmers.se
- Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonEmail verificata su cs.wisc.edu
- Vaibhav RastogiGoogleEmail verificata su wisc.edu
- Arshad JhumkaUniversity of LeedsEmail verificata su leeds.ac.uk
- Ahmed Ali-Eldin HassanAssociate Prof. Chalmers University of TechnologyEmail verificata su chalmers.se
- David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdEmail verificata su kent.ac.uk