Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
12 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Prof. Qi WangSchool of Computing, Engineering & Physical Sciences, University of the West of ScotlandEmail verificata su uws.ac.uk
- Christos GrecosChair and Full Professor of Computer Science at Arkansas State UniversityEmail verificata su astate.edu
- Jose M. Alcaraz CaleroProfessor in Cyber Security, University of the West of ScotlandEmail verificata su uws.ac.uk
- Enrique Chirivella PerezUniversity West Of ScotlandEmail verificata su uws.ac.uk
- Chunbo LuoAssociate Professor in Computer Science, University of ExeterEmail verificata su ieee.org
- Pablo Salva-GarciaUniversity of the West of Scotland (UK)Email verificata su uws.ac.uk
- Giacomo BerniniR&D Project Manager, NextworksEmail verificata su nextworks.it
- Wei JiangGerman Research Center for Artificial Intelligence (Deutsches Forschungszentrum für KünstlicheEmail verificata su dfki.de
- Hans D. SchottenUniv. of Kaiserslautern, RPTU Kaiserslautern, DFKI GmbHEmail verificata su dfki.uni-kl.de
- Luis Javier García VillalbaGroup of Analysis, Security and Systems, Department of Software Engineering and ArtificialEmail verificata su fdi.ucm.es
- Tawfik Al-HadhramiSenior LecturerEmail verificata su ntu.ac.uk
- Nasser KehtarnavazErik Jonsson Distinguished Professor, University of Texas at DallasEmail verificata su utdallas.edu
- Abbes AmiraUniversity of SharjahEmail verificata su sharjah.ac.ae
- Zeeshan PERVEZUniversity of WolverhamptonEmail verificata su wlv.ac.uk
- Sally McCleanProfessor of Mathematics, University of UlsterEmail verificata su ulster.ac.uk