Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityEmail verificata su napier.ac.uk
- Frangiskos TopalisProfessorEmail verificata su central.ntua.gr
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityEmail verificata su cybersecuritycrc.org.au
- Tiago CruzUniversity of Coimbra, Centre for Informatics and Systems of the University of Coimbra, DepartmentEmail verificata su dei.uc.pt
- Mohamed Amine Ferrag, PhD, SIEEETeam Leader, Technology Innovation InstituteEmail verificata su ieee.org
- Sotiris MoschoyiannisUniversity of SurreyEmail verificata su surrey.ac.uk
- Michalis MavrovouniotisERATOSTHENES Centre of Excellence, Cyprus University of TechnologyEmail verificata su eratosthenes.org.cy
- Antonios ArgyriouAssociate Professor, Electrical & Computer Engineering, University of ThessalyEmail verificata su uth.gr
- Pavlina FragkouDepartment of Informatics, Technological Educational Institute of AthensEmail verificata su teiath.gr
- Ki-Hyung KimAjou UniversityEmail verificata su ajou.ac.kr
- Dimitrios KosmanosPhD, University of ThessalyEmail verificata su uth.gr
- Dimitrios KatsarosAssociate Professor, University of ThessalyEmail verificata su inf.uth.gr
- Lei Shu (舒磊)Professor, Nanjing Agricultural University, China and Lincoln Professor, University of Lincoln, UKEmail verificata su njau.edu.cn
- Jianmin JiangChina 1000-plan Distinguished Professor, Shenzhen University, ChinaEmail verificata su szu.edu.cn
- Kyriaki TsilikaAssociate Professor, Department of Economics, University of ThessalyEmail verificata su uth.gr