Crea il mio profilo
Accesso pubblico
Visualizza tutto36 articoli
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Andreas MautheProfessor IT & Data Security, University Koblenz-LandauEmail verificata su uni-koblenz.de
- David HutchisonEmeritus Professor, Lancaster UniversityEmail verificata su lancaster.ac.uk
- Dimitrios PezarosProfessor of Computer Networks and RAEng Research Chair, University of GlasgowEmail verificata su glasgow.ac.uk
- Alberto E. Schaeffer-FilhoFederal University of Rio Grande do Sul (UFRGS)Email verificata su inf.ufrgs.br
- Petros SpachosEmail verificata su ieee.org
- Noor ShiraziLancaster UniversityEmail verificata su lancaster.ac.uk
- Ricardo MorlaAssistant Professor, University of PortoEmail verificata su fe.up.pt
- Paul SmithAIT Austrian Institute of TechnologyEmail verificata su ait.ac.at
- Simon MalinowskiAssociate Professor, ISTIC, Univ. RennesEmail verificata su irisa.fr
- Dr Max EizaSenior Lecturer in Computer Security, Liverpool John Moores UniversityEmail verificata su ljmu.ac.uk
- T J OWENSBRUNEL UNIVERSITYEmail verificata su brunel.ac.uk
- Qiang NiProfessor, Lancaster UniversityEmail verificata su lancaster.ac.uk
- Hema A MurthyProfessor of Computer Science and Engineering, IIT MadrasEmail verificata su cse.iitm.ac.in
- Hyun-chul KimDept. of Software, Sangmyung University, South KoreaEmail verificata su smu.ac.kr
- Miguel RodriguesProfessor of Information Theory and Processing, University College LondonEmail verificata su ucl.ac.uk
- Stephen J. SimpsonThe University of SydneyEmail verificata su sydney.edu.au
- Matt KnudsonNASA Ames Research CenterEmail verificata su nasa.gov
- Periklis ChatzimisiosProfessor, International Hellenic University,Thessaloniki, GreeceEmail verificata su ihu.gr
- James CyriacPhDEmail verificata su ucalgary.ca
- Saad Yunus SaitSRM Institute of Science and Technology, KattankulathurEmail verificata su srmist.edu.in