Get my own profile
Public access
View all37 articles
14 articles
available
not available
Based on funding mandates
Co-authors
Barbara CarminatiProfessor of Computer Science, University of InsubriaVerified email at uninsubria.itElisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Pietro ColomboUniversità dell'InsubriaVerified email at uninsubria.itAndrea PeregoEuropean ParliamentVerified email at europarl.europa.eu
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.eduSilvana CastanoUniversita' degli Studi di MilanoVerified email at unimi.it
Barbara CataniaProfessor of Computer Science, University of Genoa, ItalyVerified email at unige.it
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Giovanna GuerriniUniversità di GenovaVerified email at unige.it
Cüneyt Gürcan AkçoraAI Institute - University of Central FloridaVerified email at fulbrightmail.org
Vijayalakshmi AtluriDistinguished Professor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
Murat KantarciogluProfessor of Computer Science, Virginia TechVerified email at vt.edu
Leila BahriResearch collaborator from the industry @ KTH - StockholmVerified email at kth.se
Marco MesitiAssociate Professor, Università di milanoVerified email at di.unimi.it
Claudio BettiniUniversità degli Studi di MilanoVerified email at unimi.it
Patrick C. K. HungOntario Tech UniversityVerified email at ontariotechu.ca
Francesco BonchiResearch Director at CentaiVerified email at centai.eu
Sarunas GirdzijauskasRoyal Institute of Technology (KTH), SwedenVerified email at kth.se
Gokhan SagirlarBarbarossa SoftwareVerified email at uninsubria.it