Crea il mio profilo
Accesso pubblico
Visualizza tutto76 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ram KrishnanUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Jaehong ParkUniversity of Alabama in HuntsvilleEmail verificata su uah.edu
- Maanak GuptaAssociate Professor, Tennessee Tech UniversityEmail verificata su tntech.edu
- Xinwen ZhangHiretualEmail verificata su hiretual.com
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- Elisa BertinoProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Email verificata su nist.gov
- Gail-Joon AhnArizona State UniversityEmail verificata su asu.edu
- Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityEmail verificata su syr.edu
- Pierangela SamaratiUniversita` degli Studi di MilanoEmail verificata su unimi.it
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasEmail verificata su utdallas.edu
- David FerraioloManager, Secure Systems & Applications Group, NIST Email verificata su nist.gov
- Smriti BhattPurdue UniversityEmail verificata su purdue.edu
- James BensonUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Jianwei NiuProfessor of Computer Science, UTSAEmail verificata su utsa.edu
- Yuan ChengGrand Valley State UniversityEmail verificata su gvsu.edu
- Khalid BijonSnowflakeEmail verificata su snowflake.com
- Xin JinSoftware Engineer @ ConfluentEmail verificata su confluent.io
- Mahmoud AbdelsalamAssistant Professor, North Carolina A&T State UniversityEmail verificata su ncat.edu