Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Moatsum AlawidaAbu Dhabi University.Email verificata su adu.ac.ae
- Azman SamsudinUniversiti Sains MalaysiaEmail verificata su cs.usm.my
- Norziana JamilUnited Arab Emirates University and Universiti Tenaga NasionalEmail verificata su uaeu.ac.ae
- Jiageng ChenCentral China Normal UniversityEmail verificata su ccnu.edu.cn
- Wei-Zhu YeohCISPA Helmholtz Center for Information Security, PhD StudentEmail verificata su cispa.de
- Damilare Peter OYINLOYELecturer, Department of Computer Science, Kwara State UniversityEmail verificata su kwasu.edu.ng
- Chunhua SuDivision of Computer Science, University of Aizu, JapanEmail verificata su u-aizu.ac.jp
- Alex BiryukovFull Professor of Computer Science, University of LuxembourgEmail verificata su uni.lu
- Aleksei UdovenkoSnT, University of LuxembourgEmail verificata su uni.lu
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyEmail verificata su swin.edu.au
- Wun-She YapUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Weizhi MengDepartment of Applied Mathematics and Computer Science, Technical University of DenmarkEmail verificata su dtu.dk
- Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghEmail verificata su ed.ac.uk
- Jiashen TehAssociate Professor, University Sains Malaysia (USM)Email verificata su usm.my