Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Audun JøsangProfessor of Information Security, University of OsloEmail verificata su mn.uio.no
- Lance KaplanArmy Research LaboratoryEmail verificata su mail.mil
- Fabio Massimo ZennaroUniversity of BergenEmail verificata su uib.no
- Francesco SamboVerizon Connect Research, Florence, ItalyEmail verificata su verizonconnect.com
- Martin GieseProf., Dept. of Informatics, University of OsloEmail verificata su ifi.uio.no
- Federico CeruttiUniversity of BresciaEmail verificata su unibs.it
- Marija SlavkovikProfessor, University of BergenEmail verificata su infomedia.uib.no
- Murat SensoyDepartment of Computer Science, University College LondonEmail verificata su ucl.ac.uk
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- Dave BrainesIBM Research, UKEmail verificata su uk.ibm.com
- Tim MullerUniversity of OxfordEmail verificata su ntu.edu.sg
- Jonathan Z BakdashAgency for Healthcare Research and QualityEmail verificata su ahrq.hhs.gov
- Jie ZhangProfessor of Computer Science, Nanyang Technological UniversityEmail verificata su ntu.edu.sg