Get my own profile
Public access
View all26 articles
13 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Barbara CarminatiProfessor of Computer Science, University of InsubriaVerified email at uninsubria.it
Andrea PeregoEuropean ParliamentVerified email at europarl.europa.eu
Pietro ColomboUniversità dell'InsubriaVerified email at uninsubria.it
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
Silvana CastanoUniversita' degli Studi di MilanoVerified email at unimi.it
Barbara CataniaProfessor of Computer Science, University of Genoa, ItalyVerified email at unige.it
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Giovanna GuerriniUniversità di GenovaVerified email at unige.it
Murat KantarciogluProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
Cüneyt Gürcan AkçoraUniversity of Central FloridaVerified email at fulbrightmail.org
Leila BahriResearch collaborator from the industry @ KTH - StockholmVerified email at kth.se
Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
Marco MesitiAssociate Professor, Università di milanoVerified email at di.unimi.it
Claudio BettiniUniversity of MilanVerified email at unimi.it
Patrick C. K. HungOntario Tech UniversityVerified email at ontariotechu.ca
Francesco BonchiResearch Director at CentaiVerified email at centai.eu
Jianneng Cao (曹健能)Bank JagoVerified email at tech.jago.com
Amar GuptaMITVerified email at mit.edu