Get my own profile
Public access
View all64 articles
19 articles
available
not available
Based on funding mandates
Co-authors
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Lingyu WangProfessor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia UniversityVerified email at ciise.concordia.ca
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Sabrina De Capitani di VimercatiComputer Science Department, Universita' degli Studi di Milano, ItalyVerified email at unimi.it
Claudio BettiniUniversity of MilanVerified email at unimi.it
Stefano ParaboschiProfessor of Computer Science and Engineering, Università degli Studi di Bergamo, ItalyVerified email at unibg.it
Sara ForestiUniversita' degli Studi di MilanoVerified email at unimi.it
Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Steven NoelCybersecurity Researcher, The MITRE CorporationVerified email at mitre.org
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
Paul AmmannAssociate Professor of Computer Science, George Mason UniversityVerified email at gmu.edu
Peng NingGoogleVerified email at google.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it