Get my own profile
Public access
View all23 articles
16 articles
available
not available
Based on funding mandates
Co-authors
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Barbara CarminatiProfessor of Computer Science, University of InsubriaVerified email at uninsubria.it
- Andrea PeregoEuropean ParliamentVerified email at europarl.europa.eu
- Pietro ColomboUniversità dell'InsubriaVerified email at uninsubria.it
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
- Silvana CastanoUniversita' degli Studi di MilanoVerified email at unimi.it
- Barbara CataniaProfessor of Computer Science, University of Genoa, ItalyVerified email at unige.it
- Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
- Giovanna GuerriniUniversità di GenovaVerified email at unige.it
- Cüneyt Gürcan AkçoraAI Institute - University of Central FloridaVerified email at fulbrightmail.org
- Murat KantarciogluProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
- Leila BahriResearch collaborator from the industry @ KTH - StockholmVerified email at kth.se
- Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
- Marco MesitiAssociate Professor, Università di milanoVerified email at di.unimi.it
- Claudio BettiniUniversity of MilanVerified email at unimi.it
- Patrick C. K. HungOntario Tech UniversityVerified email at ontariotechu.ca
- Francesco BonchiResearch Director at CentaiVerified email at centai.eu
- Jianneng Cao (曹健能)Bank JagoVerified email at tech.jago.com
- Amar GuptaMITVerified email at mit.edu