Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stefan RassFull Professor, LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, AustriaEmail verificata su jku.at
- Stefan SchauerAIT Austrian Institute of TechnologyEmail verificata su ait.ac.at
- Antonios GouglidisAssociate Professor, Lancaster UniversityEmail verificata su lancaster.ac.uk
- Quanyan ZhuDepartment of Electrical and Computer Engineering, New York UniversityEmail verificata su nyu.edu
- Manos PanaousisProfessor of Cyber Security, Centre for Sustainable Cyber Security (CS2), University of GreenwichEmail verificata su greenwich.ac.uk
- Ali AlshawishChair of Computer Networks and Computer Communications, University of PassauEmail verificata su uni-passau.de
- Christoph SchmittnerScientist, AIT Austrian Instituit of TechnologyEmail verificata su ait.ac.at
- Michalis PavlidisPrincipal Lecturer in Cyber Security, University of BrightonEmail verificata su brighton.ac.uk
- David HutchisonEmeritus Professor, Lancaster UniversityEmail verificata su lancaster.ac.uk
- Haralambos MouratidisDirector, Institute for Analytics and Data Science (IADS), University of EssexEmail verificata su essex.ac.uk
- Mohamed Amine AbidUniversity of PassauEmail verificata su uni-passau.de
- Klaus SteinnocherSenior Scientist, Austrian Institute of TechnologyEmail verificata su ait.ac.at
- Andrea PferscherPostdoctoral Research Fellow, Department of Informatics, University of OsloEmail verificata su ifi.uio.no
- Paul SmithAIT Austrian Institute of TechnologyEmail verificata su ait.ac.at
- Peter MayerSenior Researcher, Applied Assistive Technologies, Inst. for Design and Assessment of Technology, TU ViennaEmail verificata su fortec.tuwien.ac.at