Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Salvatore StolfoProfessor of Computer Science, Columbia UniversityEmail verificata su columbia.edu
- shlomo hershkopUniversity of PennsylvaniaEmail verificata su shlomohershkop.com
- Angelos D. KeromytisGeorgia Institute of TechnologyEmail verificata su gatech.edu
- Vasileios P. KemerlisAssistant Professor, Brown UniversityEmail verificata su cs.brown.edu
- Pratap PrabhuColumbia UniversityEmail verificata su rootshell.in
- Matt BishopUniversity of California at DavisEmail verificata su ucdavis.edu
- Yingbo SongPeraton LabsEmail verificata su peratonlabs.com
- Jonathan VorisLunch Actually GroupEmail verificata su voris.tech
- Christian W ProbstUnitec Institute of TechnologyEmail verificata su unitec.ac.nz
- Kamrul Hasan, Ph.D.Assistant Professor of Cybersecurity, Tennessee State University, Nashville, TNEmail verificata su tnstate.edu
- Sachin ShettyOld Dominion UniversityEmail verificata su odu.edu
- Steven BellovinProfessor of Computer Science, Columbia UniversityEmail verificata su cs.columbia.edu
- Nahid Farhady GhalatySecurity ML EngineerEmail verificata su vt.edu
- Ilsun YouKookmin UniversityEmail verificata su kookmin.ac.kr
- Elisa BertinoProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Charles V. WrightAssociate Professor, Portland State UniversityEmail verificata su pdx.edu
- Herbert BosProfessor of Computer Science, Vrije Universiteit AmsterdamEmail verificata su cs.vu.nl
- Angelos StavrouProfessor at Virginia TechEmail verificata su vt.edu
- Dongwan ShinProfessor of Computer Science and Engineering, New Mexico TechEmail verificata su nmt.edu