Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
8 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Roch H. GlithoProfessor and Ericsson/ENCQOR-5G Senior Industrial Research Chair, Concordia UniversityEmail verificata su ciise.concordia.ca
- Noel CrespiProfessor @ Telecom SudParis, Institut Mines-Telecom, Institut Polytechnique de ParisEmail verificata su it-sudparis.eu
- Prof. May El BarachiHead of School of Computer ScienceEmail verificata su uowdubai.ac.ae
- Omar AlfandiProfessor at Zayed University - UAE | Adj. Faculty at Göttingen University - GermanyEmail verificata su zu.ac.ae
- Rachida DssouliConcordia UniversityEmail verificata su concordia.ca
- nadjia karaProfessor, ETSEmail verificata su etsmtl.ca
- Imran KhanPh.D., Data Domain Expert at Schneider Electric, Senior Member IEEEEmail verificata su ieee.org
- Mohamad BadraZayed UniversityEmail verificata su zu.ac.ae
- Jose M. Alcaraz CaleroProfessor in Cyber Security, University of the West of ScotlandEmail verificata su uws.ac.uk
- Carla MouradianPh.D., Senior Researcher at EricssonEmail verificata su ericsson.com
- Rabeb MizouniKhalifa UniversityEmail verificata su ku.ac.ae
- Hanieh AlipourSenior Data Scientist at SAPEmail verificata su sap.com
- Ernesto DamianiKhalifa UniversityEmail verificata su ku.ac.ae