Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kenichi MatsumotoNAISTEmail verificata su is.naist.jp
- Raula Gaikovina KulaNara Institute of Science and TechnologyEmail verificata su is.naist.jp
- Takashi IshioFuture University HakodateEmail verificata su fun.ac.jp
- Akinori IharaLecturer, Wakayama UniversityEmail verificata su wakayama-u.ac.jp
- Arnon RungsawangDept. of Computer Engineering, Kasetsart UniversityEmail verificata su ku.ac.th
- Supatsara WattanakriengkraiNara Institute of Science and TechnologyEmail verificata su is.naist.jp
- Bundit ManaskasemsakDepartment of Computer Engineering, Faculty of Engineering, Kasetsart UniversityEmail verificata su mikelab.net
- Shane McIntoshUniversity of WaterlooEmail verificata su uwaterloo.ca
- Antonino SabettaSAP Security ResearchEmail verificata su sap.com
- Henrik PlateSecurity Researcher, Endor LabsEmail verificata su endor.ai
- Serena Elisa PontaSAP Security ResearchEmail verificata su sap.com
- Passakorn PhannachittaCollege of Arts, Media and TechnologyEmail verificata su cmu.ac.th
- Naoyasu UbayashiProfessor, Kyushu UniversityEmail verificata su acm.org
- Yasutaka KameiProfessor, Kyushu University, InaRIS FellowEmail verificata su ait.kyushu-u.ac.jp
Segui
Bodin Chinthanet
Software Engineering Laboratory, Nara Institute of Science and Technology
Email verificata su is.naist.jp - Home page