Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- John S. BarasProfessor of Ellectrical and Computer Engineering, University of MarylandEmail verificata su umd.edu
- Reza ShokriNational University of Singapore; MicrosoftEmail verificata su comp.nus.edu.sg
- Jean-Pierre HubauxProfessor, EPFLEmail verificata su epfl.ch
- Jean-Yves Le BoudecHonorary professor of communication systems, EPFLEmail verificata su epfl.ch
- Dr Eirini AnthiCybersecurity Lecturer, Cardiff UniversityEmail verificata su cardiff.ac.uk
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceEmail verificata su cs.cardiff.ac.uk
- Panos PapadimitratosKTH (Royal Institute of Technology)Email verificata su kth.se
- Carmela TroncosoEPFLEmail verificata su epfl.ch
- Omer RanaCardiff University, UKEmail verificata su cardiff.ac.uk
- Ehsan KazemiGoogleEmail verificata su google.com
- George DanezisMysten Labs & University College LondonEmail verificata su ucl.ac.uk
- Ioannis StavrakakisProfessor of Computer Science / Telecommunications, National and Kapodistrian University of AthensEmail verificata su di.uoa.gr
- Mahesh K. MarinaSchool of Informatics, The University of EdinburghEmail verificata su inf.ed.ac.uk
- Svetlana RadosavacInstitutional Shareholder ServicesEmail verificata su issgovernance.com
- Hugh LeatherUniversity of EdinburghEmail verificata su inf.ed.ac.uk
- Thanasis PapaioannouAssistant Professor, NKUA, Greece & Senior Researcher, AUEB, GreeceEmail verificata su aueb.gr
- Spyros LalisProfessor of Computer Science, University of ThessalyEmail verificata su inf.uth.gr
- Grigorios Loukides, PhDKing's College LondonEmail verificata su kcl.ac.uk