Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- David GrawrockTwentySeven34Email verificata su twentyseven34.com
- Marcello BalducciniDecision and System Sciences, Saint Joseph's UniversityEmail verificata su sju.edu
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioEmail verificata su buffalo.edu
- David A. WollmanDeputy Division Chief, Smart Connected Systems Division, Communications Technology Laboratory, NISTEmail verificata su nist.gov
- Andrew WhinstonUniversity of Texas at AustinEmail verificata su uts.cc.utexas.edu
- Suresh K. DamodaranMITRE CorporationEmail verificata su acm.org
- Rajarshi ChakrabortyGraduate Assistant, University at BuffaloEmail verificata su buffalo.edu
- Frederick T. SheldonProfessorEmail verificata su uidaho.edu
- Marcin WójcikEmail verificata su cam.ac.uk
- Roel MaesIntrinsic IDEmail verificata su intrinsic-id.com
- Wei WuIntelEmail verificata su intel.com
- Ghassan KarameProfessor of Computer Science, Ruhr Universität Bochum (RUB)Email verificata su rub.de
- Marcel WinandySenior Expert Cyber Security Architect at E.ONEmail verificata su eon.com
- Louis MarinosBornemouth UniversityEmail verificata su enisa.europa.eu
- Simon P. JohnsonIntelEmail verificata su intel.com
- Jeff SedayaoIntel CorporationEmail verificata su intel.com
- Fred ChongSeymour Goodman Professor, UChicago; and Chief Scientist for Quantum Software, InfleqtionEmail verificata su cs.uchicago.edu
- Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceEmail verificata su princeton.edu
- Ingrid VerbauwhedeKU LeuvenEmail verificata su esat.kuleuven.be
- Christian W ProbstUnitec Institute of TechnologyEmail verificata su unitec.ac.nz