Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Ruben TorresSymantecVerified email at symantec.com
- Marco MelliaPolitecnico di Torino, italyVerified email at polito.it
- R. SekarProfessor of Computer Science, Stony Brook UniversityVerified email at cs.stonybrook.edu
- Marios IliofotouData Scientists & Engineer @ Splunk>Verified email at cs.ucr.edu
- Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Mario BaldiDipartimento di Automatica e Automatica, Politecnico di TorinoVerified email at polito.it
- Elena BaralisFull Professor, Computer engineering, Politecnico di Torino, ItalyVerified email at polito.it
- Danilo GiordanoAssistant Professor, Politecnico di TorinoVerified email at polito.it
- Stefano TraversoErmes Cyber SecurityVerified email at polito.it
- Xiaoyin WangProfessor, University of Texas at San AntonioVerified email at utsa.edu
- Sung-Ju LeeKAISTVerified email at kaist.ac.kr
- Maurizio M. Munafo'Assistant Professor, Department of Electronics and Communications, Politecnico di TorinoVerified email at polito.it
- Z. Morley Mao (茅斫青)University of MichiganVerified email at umich.edu
- Fulvio RissoPolitecnico di TorinoVerified email at frisso.net
- Amedeo SapioAWSVerified email at amazon.com
- Alan MisloveProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Han hee SongApple Inc.Verified email at utexas.edu
- Zhi-Li ZhangDistinguished McKnight University Professor and Qwest Chair ProfessorVerified email at cs.umn.edu
- Hesham MekkyUniversity of MinnesotaVerified email at cs.umn.edu
- Sabyasachi SahaPrincipal Engineer