Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Antonio MañaProfessor of Computer Science, University of MalagaEmail verificata su lcc.uma.es
- Javier LopezProfessor of Computer Science, University of MalagaEmail verificata su lcc.uma.es
- Hristo KoshutanskiAtos Research & Innovation, SpainEmail verificata su atos.net
- Carsten RudolphMonash University, Melbourne, AustraliaEmail verificata su monash.edu
- Carmen Fernandez GagoUniversity of Malaga (Spain)Email verificata su lcc.uma.es
- Ana Checa-RosClinician and Researcher in Paediatrics, University of GranadaEmail verificata su correo.ugr.es
- Luca CompagnaSAP Security ResearchEmail verificata su sap.com
- Jamal ToutouhMassachusetts Institute of Technology (MIT)Email verificata su mit.edu
- George SpanoudakisProfessor, City University LondonEmail verificata su city.ac.uk
- Eamonn PowerCTO, Telenostic Ltd.Email verificata su telenostic.com
- Marcos ArjonaTechnical Research Assistant, University of MalagaEmail verificata su lcc.uma.es
- Jose Fran. RuizAtosEmail verificata su atos.net
- Sergio NesmachnowFull Professor, Universidad de la República, UruguayEmail verificata su fing.edu.uy
- Paolo GiorginiProfessor of Computer Science, University of TrentoEmail verificata su unitn.it
- Raian AliProfessor, HBKU, QatarEmail verificata su hbku.edu.qa
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyEmail verificata su fbk.eu
- Javier GonzálezMicrosoft Research CambridgeEmail verificata su microsoft.com