Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Theo DimitrakosProfessorial Fellow, University of KentEmail verificata su ifiptm.org
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonEmail verificata su city.ac.uk
- Nektarios GeorgalasBT Intel Co-lab Director, British TelecomEmail verificata su bt.com
- Ali SajjadBT Applied ResearchEmail verificata su bt.com
- Joshua DanielOnyx, JPMorgan Chase & Co.Email verificata su bt.com
- David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdEmail verificata su kent.ac.uk
- Srinath SrinivasaIIIT BangaloreEmail verificata su iiitb.ac.in
- Srinivas GuntupalliSoftware Engineer, NetskopeEmail verificata su netskope.com
- Subramanian NeelakantanSenior Director (R&D), C-DACEmail verificata su cdac.in
- Satyanarayana NCentre for Development of Advanced Computing, HyderabadEmail verificata su cdac.in
- Omer RanaCardiff University, UKEmail verificata su cardiff.ac.uk
- George SpanoudakisProfessor, City University LondonEmail verificata su city.ac.uk
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceEmail verificata su cs.cardiff.ac.uk
- Yoga RahulamathavanReader in Cybersecurity and Privacy, Loughborough University, UKEmail verificata su lboro.ac.uk
- Mariam KiranOak Ridge National LaboratoryEmail verificata su ornl.gov
- Jordi GuitartUniversitat Politècnica de Catalunya (UPC); Barcelona Supercomputing Center (BSC)Email verificata su ac.upc.edu
- Jorge Ejarque ArtigasResearcher at Workflows and Distributed Computing Group, Barcelona Supercomputing CenterEmail verificata su bsc.es
- Petter SvärdUmeå UniversityEmail verificata su cs.umu.se
- Daniel EsplingPhD, Computing Science, Umeå UniversityEmail verificata su cs.umu.se
- Johan TordssonElastisys and Umeå University (computing science)Email verificata su cs.umu.se