Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Samir TataTélécom SudParis, Institut Mines-Télécom, FranceEmail verificata su it-sudparis.eu
- Heiko LudwigResearch Manager, IBM ResearchEmail verificata su us.ibm.com
- Nagapramod MandagereCohesityEmail verificata su cohesity.com
- Lukas RupprechtResearch Staff Member, IBM Research AlmadenEmail verificata su ibm.com
- Vasily TarasovSenior Research Scientist, IBM ResearchEmail verificata su us.ibm.com
- Dean HildebrandGoogleEmail verificata su google.com
- Dimitris SkourtisVectorizedEmail verificata su soe.ucsc.edu
- Sami YanguiLAAS-CNRSEmail verificata su laas.fr
- Ali AnwarAssistant Professor, University of MinnesotaEmail verificata su umn.edu
- Obinna AnyaGoogleEmail verificata su google.com
- Ali R. ButtProfessor of Computer Science, Virginia TechEmail verificata su cs.vt.edu
- Mohamed SellamiInstitut Polytechnique de Paris, Institut Mines-Telecom, Telecom SudParisEmail verificata su telecom-sudparis.eu
- Ling LiuGeorgia Institute of TechnologyEmail verificata su cc.gatech.edu
- Yue ChengThe University of Hong KongEmail verificata su hku.hk
- Nesrine KaanicheInstitut Polytechnique de ParisEmail verificata su telecom-sudparis.eu
- Emre YigitogluGeorgia Institute of TechnologyEmail verificata su gatech.edu
- Mourad AmzianiPh.D., Cloud Project Director at Direction interministérielle du Numérique (DINUM)Email verificata su modernisation.gouv.fr
- Tarek MellitiAssociate Professor at University of Evry, FranceEmail verificata su ibisc.fr
- Sana BelguithLecturer in Cyber Security and Applied Cryptography, University of Bristol UKEmail verificata su bristol.ac.uk
- Ming ZhaoAssociate Professor, Arizona State UniversityEmail verificata su asu.edu