Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Elisa BertinoProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- alessandra russoProfessor in Applied Computational LogicEmail verificata su imperial.ac.uk
- Qun NiSoftware Engineer, Google IncEmail verificata su google.com
- Dan (Linda) LinProfessor of Computer Science, Director of I-Privacy Lab, Vanderbilt UniversityEmail verificata su vanderbilt.edu
- Arcot RajasekarProfessor of Information Science, University of North Carolina at Chapel HillEmail verificata su unc.edu
- Emil LupuProfessor of Computer SystemsEmail verificata su imperial.ac.uk
- Ian MolloyIBM ResearchEmail verificata su us.ibm.com
- Jiefei MaResearch Associate in Computing, Imperial College LondonEmail verificata su imperial.ac.uk
- Chitta BaralProfessor of Computer Science, Arizona State UniversityEmail verificata su asu.edu
- Morris SlomanDepartment of Computing, Imperial College LondonEmail verificata su imperial.ac.uk
- Randeep BhatiaBell Labs, NokiaEmail verificata su research.bell-labs.com
- Kang-Won LeeChief Digital Officer, SK On, SK Telecom, IBM ResearchEmail verificata su sk.com
- Dakshi AgrawalIBM Fellow, IBMEmail verificata su us.ibm.com
- Windhya RankothgeResearch Associate (Faculty), Canadian Institute for Cybersecurity, University of New BrunswickEmail verificata su unb.ca
- Dinesh VermaIBMEmail verificata su us.ibm.com
- Jan ChomickiProfessor of Computer Science and Engineering, SUNY at BuffaloEmail verificata su buffalo.edu
- Alberto TrombettaAssociate Professor of Computer Science, University of InsubriaEmail verificata su uninsubria.it
- Goce TrajcevskiDept. of ECpE, Iowa State UniversityEmail verificata su iastate.edu
- Prof. Arosha K. BandaraProfessor of Software Engineering, The Open UniversityEmail verificata su open.ac.uk
- Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityEmail verificata su cs.cmu.edu