Get my own profile
Public access
View all124 articles
37 articles
available
not available
Based on funding mandates
Co-authors
- Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
- Barbara CataniaProfessor of Computer Science, University of Genoa, ItalyVerified email at unige.it
- Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
- James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPVerified email at pitt.edu
- Giovanna GuerriniUniversità di GenovaVerified email at unige.it
- maria luisa damianiProfessor of Computer Science, University of Milan, ItalyVerified email at unimi.it
- Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
- Gabriel GhinitaHamad Bin Khalifa UniversityVerified email at umb.edu
- Murat KantarciogluProfessor of Computer Science, Virginia TechVerified email at vt.edu
- Mohamed NabeelPalo Alto Networks/National UniversityVerified email at cs.purdue.edu
- Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
- Marco MesitiAssociate Professor, Università di milanoVerified email at di.unimi.it
- Qun NiSoftware Engineer, Google IncVerified email at google.com
- Vijayalakshmi AtluriDistinguished Professor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
- Aleksandar IgnjatovicUniversity of New South WalesVerified email at cse.unsw.edu.au
- Ning ShangQualcommVerified email at qti.qualcomm.com
Follow
Elisa Bertino
Professor of Computer Science, Purdue University
Verified email at purdue.edu - Homepage