Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Andreas JacobssonAssociate Professor in Computer Science @ Malmö UniversityEmail verificata su mah.se
- Paul DavidssonProfessor of Computer Science, Malmö University, SwedenEmail verificata su mau.se
- Bahtijar VogelAssociate Professor, Computer Science, Malmö UniversityEmail verificata su mau.se
- Victor R. KebandeAsst Professor of Cyber & IT Security, Blekinge Institute of Technology, SwedenEmail verificata su bth.se
- Jan A. PerssonMalmö HögskolaEmail verificata su mau.se
- SADI ALAWADIAssociated Professor of Machine Learning at Blekinge Tekniska Högskola (BTH), SwedenEmail verificata su bth.se
- Carl Magnus OlssonAssociate Professor of Computer Science, Malmö UniversityEmail verificata su mau.se
- Miranda KajtaziDepartment of Informatics, Lund UniversityEmail verificata su ics.lu.se
- Yuji DongXi'an Jiaotong Liverpool UniversityEmail verificata su xjtlu.edu.cn
- Romina SpalazzeseAssoc. Prof. in Computer Science at Malmö UniversityEmail verificata su mau.se
- Johan HolmbergMalmö UniversityEmail verificata su mau.se
- Agnes TegenResearcher at FOIEmail verificata su foi.se
- Arezoo Sarkheyli-hägeleAssistant Professor at Malmö UniversityEmail verificata su mau.se