Get my own profile
Public access
View all119 articles
30 articles
available
not available
Based on funding mandates
Co-authors
Elena FerrariUniversity of InsubriaVerified email at uninsubria.it
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
Barbara CataniaProfessor of Computer Science, University of Genoa, ItalyVerified email at unige.it
Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPVerified email at pitt.edu
Giovanna GuerriniUniversitą di GenovaVerified email at unige.it
maria luisa damianiProfessor of Computer Science, University of Milan, ItalyVerified email at unimi.it
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Gabriel GhinitaUniversity of Massachusetts BostonVerified email at umb.edu
Murat KantarciogluProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
Mohamed NabeelSenior Research Scientist at Qatar Computing Research Institute/Purdue UniversityVerified email at cs.purdue.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Marco MesitiAssociate Professor, Universitą di milanoVerified email at di.unimi.it
Qun NiSoftware Engineer, Google IncVerified email at google.com
Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
Ning ShangQualcommVerified email at qti.qualcomm.com
Follow
Elisa Bertino
Professor of Computer Science, Purdue University
Verified email at purdue.edu - Homepage