Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityEmail verificata su imm.dtu.dk
- Michele BugliesiProfessor of Computer Science, Universita' Ca' Foscari VeneziaEmail verificata su unive.it
- Victor Chang (Data Scientist,Industry 5...Professor of Business Analytics, Aston UniversityEmail verificata su aston.ac.uk
- Lewis GolightlyLecturer in Cybersecurity and Blockchain at Teesside UniversityEmail verificata su tees.ac.uk
- Omar AlmousaJordan University of Science and TechnologyEmail verificata su just.edu.jo
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
- Leo FreitasSenior Lecturer in Formal Methods and Tools, School of Computing Science, Newcastle University, UKEmail verificata su newcastle.ac.uk
- Stefano CalzavaraUniversità Ca' Foscari VeneziaEmail verificata su unive.it
- Anna KobusińskaInstitute of Computing Science, Poznań University of TechnologyEmail verificata su cs.put.poznan.pl
- Siamak F. ShahandashtiUniversity of York, UKEmail verificata su york.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickEmail verificata su warwick.ac.uk
- Thomas GroßProfessor of System Security, Newcastle UniversityEmail verificata su ncl.ac.uk
- Martin EmmsNewcastle UniversityEmail verificata su newcastle.ac.uk
- Dr. Lothar FritschProfessor, Oslo Metropolitan University, NorwayEmail verificata su lotharfritsch.de
- Kovila PL CoopamootooKing's College LondonEmail verificata su kcl.ac.uk
- Meiko JensenSenior Lecturer for Cybersecurity at Karlstad University, SwedenEmail verificata su kau.se
- Patrick McCorryCrypto enthusiast
Segui
Paolo Modesti
Senior Lecturer in Cybersecurity, Teesside University, UK, Europe
Email verificata su tees.ac.uk - Home page