Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Falko DresslerTechnische Universität BerlinEmail verificata su ccs-labs.org
- Reinhard GermanEmail verificata su fau.de
- David EckhoffTUM CREATEEmail verificata su tum-create.edu.sg
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityEmail verificata su cybersecuritycrc.org.au
- Christoph SommerChair of Networked Systems Modeling, TU Dresden, GermanyEmail verificata su tu-dresden.de
- Eerke BoitenSchool of Computer Science and Informatics, De Montfort University, UKEmail verificata su dmu.ac.uk
- Ying HeThe University of NottinghamEmail verificata su nottingham.ac.uk
- Yuchen ZhaoUniversity of YorkEmail verificata su york.ac.uk
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityEmail verificata su napier.ac.uk
- Ali H. Al-BayattiAssociate Professor, Cyber Technology Institute, De Montfort UniversityEmail verificata su dmu.ac.uk
- Thomas ReisingerSchool of Computer Science and Informatics, De Montfort University, UKEmail verificata su my365.dmu.ac.uk
- Iryna YevseyevaDe Montfort University, LeicesterEmail verificata su dmu.ac.uk
- Thomas Halva LabellaLuxoftEmail verificata su online.de
- Joseph Richard SnapeLecturer and Research Fellow, Institute of Energy and Sustainable Development, De MontfortEmail verificata su dmu.ac.uk
- Lee HadlingtonSenior Lecturer In Cyberpsychology, Nottingham Trent UniversityEmail verificata su ntu.ac.uk
- Ulrich RüdeProfessor for Computational Science and Engineering, FAU Erlangen-NürnbergEmail verificata su fau.de
- Aladdin AyeshProfessor of Artificial Intelligence, University of Aberdeen, UKEmail verificata su abdn.ac.uk
- Kai-Steffen HielscherAssitant Professor Computer Science, FAU ErlangenEmail verificata su fau.de