Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Anang Hudaya Muhamad AminAssistant Professor, Higher Colleges of Technology - Dubai Men'sEmail verificata su hct.ac.ae
- Raja Azlina Raja MahmoodFaculty of Computer Science and Information Technology, Universiti Putra MalaysiaEmail verificata su upm.edu.my
- Dr. Benny Benyamin Nasution, Dipl.In...Senior Lecturer of Information Technology, Politeknik Negeri MedanEmail verificata su polmed.ac.id
- Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaEmail verificata su deakin.edu.au
- Evgeny OsipovProfessor, Luleå University of TechnologyEmail verificata su ltu.se
- Mohamed BaqerAssistant Professor, University of BahrainEmail verificata su uob.edu.bh
- Ardeshir Bahreininejad, ProfessorUniversiti Teknologi BruneiEmail verificata su utb.edu.bn
- Denis KleykoÖrebro University & RISE Research institutes of SwedenEmail verificata su oru.se
- Ahmet SekerciogluSorbonne Universités, UTC CNRS Heudiasyc LaboratoryEmail verificata su ieee.org
- Dr. Jan Carlo BarcaAustralian Public ServantEmail verificata su defence.gov.au
- Jens EliassonEISLAB, Luleå University of TechnologyEmail verificata su ltu.se
- Julian F V VincentHonorary Professor, Heriot-Watt UniversityEmail verificata su hw.ac.uk
- Fredrik SandinProfessor in Machine Learning, Luleå University of Technology, EISLAB, SwedenEmail verificata su ltu.se
- Elisabetta ChiccaZernike Institute for Advanced Materials and CogniGron Center, University of GroningenEmail verificata su rug.nl
- Heinrich (Heinz) Wilhelm SchmidtComputer Science, RMIT University & Innovation Software AdvisoryEmail verificata su rmit.edu.au