Get my own profile
Public access
View all24 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Sang-Yoon ChangUniversity of Colorado Colorado SpringsVerified email at uccs.edu
Xiaobo ZhouUniversity of Macau; UCCSVerified email at um.edu.mo
Zhihui DuDepartment of Compuer Science, New Jersey Institute of TechnologyVerified email at njit.edu
David FernándezUniversidad Politécnica de MadridVerified email at upm.es
Jinoh KimProfessor of Computer Science, Texas A&M University-CommerceVerified email at tamuc.edu
Rogério de LemosUniversity of Kent, UKVerified email at kent.ac.uk
Younghee ParkComputer Engineering, San Jose State UniversityVerified email at sjsu.edu
Victor A. Villagra (ORCID: 0000-0002-...Universidad Politecnica de MadridVerified email at upm.es
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdVerified email at kent.ac.uk
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
C. Edward ChowUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Chai YunpengProfessor of Computer Science, Renmin University of ChinaVerified email at ruc.edu.cn
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Shawn EmeryUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Yinong ChenArizona State UniversityVerified email at asu.edu