Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphEmail verificata su uoguelph.ca
- Sattar HashemiProfessor of Artificial Intelligence, Shiraz UniversityEmail verificata su shirazu.ac.ir
- Marzieh AhmadzadehYork UniversityEmail verificata su yorku.ca
- Raouf KhayamiShiraz University of TechnologyEmail verificata su sutech.ac.ir
- Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, GA, USAEmail verificata su kennesaw.edu
- Hamid DarabianShiraz UniversityEmail verificata su cse.shirazu.ac.ir
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Ahmad JaliliAssistant Professor of Computer Networks, Department of Computer Engineering and InformationEmail verificata su gonbad.ac.ir
- Manijeh KeshtgaryDept. of Computer Eng. & IT, Shiraz University of TechnologyEmail verificata su alumni.colostate.edu
- Yousef EmamiFEUP, University of PortoEmail verificata su fe.up.pt
- Mohammad Reza Salehishiraz university of technoogyEmail verificata su sutech.ac.ir
- Ebrahim Torki ZadehK.N Toosi University of technologyEmail verificata su niopdc.ir
Segui
Sajad Homayoun
Postdoc Researcher, Denmark Technical University (DTU)
Email verificata su dtu.dk - Home page