Get my own profile
Public access
View all20 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Sang-Yoon ChangUniversity of Colorado Colorado SpringsVerified email at uccs.edu
Zhihui DuDepartment of Compuer Science, New Jersey Institute of TechnologyVerified email at njit.edu
David FernándezUniversidad Politécnica de MadridVerified email at upm.es
Xiaobo ZhouUniversity of Macau; University of Colorado Colorado SpringsVerified email at um.edu.mo
Simeon WuthierUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Rogério de LemosUniversity of Kent, UKVerified email at kent.ac.uk
Jinoh KimAssociate Professor, Texas A&M University-CommerceVerified email at tamuc.edu
Victor A. Villagra (ORCID: 0000-0002-...Universidad Politecnica de MadridVerified email at upm.es
Younghee ParkComputer Engineering, San Jose State UniversityVerified email at sjsu.edu
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
David W ChadwickEmeritus Professor, University of Kent. Product Director, Crossword Cybersecurity PLCVerified email at kent.ac.uk
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
C. Edward ChowUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Max Smith-CreaseyBritish Telecommunications / City, University of LondonVerified email at city.ac.uk
Chai YunpengProfessor of Computer Science, Renmin University of ChinaVerified email at ruc.edu.cn
Shawn EmeryUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Yinong ChenArizona State UniversityVerified email at asu.edu