Get my own profile
Public access
View all22 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Sang-Yoon ChangUniversity of Colorado Colorado SpringsVerified email at uccs.edu
Zhihui DuDepartment of Compuer Science, New Jersey Institute of TechnologyVerified email at njit.edu
David FernándezUniversidad Politécnica de MadridVerified email at upm.es
Xiaobo ZhouUniversity of MacauVerified email at um.edu.mo
Simeon WuthierUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Jinoh KimAssociate Professor, Texas A&M University-CommerceVerified email at tamuc.edu
Rogério de LemosUniversity of Kent, UKVerified email at kent.ac.uk
Victor A. Villagra (ORCID: 0000-0002-...Universidad Politecnica de MadridVerified email at upm.es
Younghee ParkComputer Engineering, San Jose State UniversityVerified email at sjsu.edu
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdVerified email at kent.ac.uk
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
C. Edward ChowUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Chai YunpengProfessor of Computer Science, Renmin University of ChinaVerified email at ruc.edu.cn
Shawn EmeryUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Yinong ChenArizona State UniversityVerified email at asu.edu