Get my own profile
Public access
View all24 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Sang-Yoon ChangUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Zhihui DuDepartment of Compuer Science, New Jersey Institute of TechnologyVerified email at njit.edu
- David FernándezUniversidad Politécnica de MadridVerified email at upm.es
- Xiaobo ZhouUniversity of Macau; UCCSVerified email at um.edu.mo
- Simeon WuthierNational Institute of Standards and TechnologyVerified email at nist.gov
- Jinoh KimAssociate Professor, Texas A&M University-CommerceVerified email at tamuc.edu
- Rogério de LemosUniversity of Kent, UKVerified email at kent.ac.uk
- Younghee ParkComputer Engineering, San Jose State UniversityVerified email at sjsu.edu
- Victor A. Villagra (ORCID: 0000-0002-...Universidad Politecnica de MadridVerified email at upm.es
- Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
- David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdVerified email at kent.ac.uk
- Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
- C. Edward ChowUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
- Chai YunpengProfessor of Computer Science, Renmin University of ChinaVerified email at ruc.edu.cn
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Shawn EmeryUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
- Yinong ChenArizona State UniversityVerified email at asu.edu