Crea il mio profilo
Accesso pubblico
Visualizza tutto28 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyEmail verificata su rit.edu
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatEmail verificata su ics.uci.edu
- Nacho (Ignacio) SolisLinkedInEmail verificata su igso.net
- Cesar GhaliSoftware Engineer, GoogleEmail verificata su uci.edu
- Colin PerkinsSenior Lecturer (Associate Professor), School of Computing Science, University of GlasgowEmail verificata su csperkins.org
- Marcin LukowiakRochester Institute of TechnologyEmail verificata su rit.edu
- G FairhurstEmail verificata su erg.abdn.ac.uk
- Philipp S. TieselTU BerlinEmail verificata su inet.tu-berlin.de
- Stanisław RadziszowskiRochester Institute of TechnologyEmail verificata su cs.rit.edu
- Jun KuriharaZettant Inc.Email verificata su ieee.org
- Anna BrunstromProfessor in Computer Scienec, Karlstad UniversityEmail verificata su kau.se
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleEmail verificata su math.unipd.it
- Paolo GastiAssociate Professor at New York Institute of TechnologyEmail verificata su nyit.edu
- Michael T KurdzielMember of Technical Staff, L3Harris; Adjunct Professor, Rochester Institute of TechnologyEmail verificata su L3Harris.com
- James R VallinoProfessor of Software Engineering, Rochester Institute of TechnologyEmail verificata su se.rit.edu
- Gergely AcsResearch Engineer, INRIAEmail verificata su inria.fr
- Ashok NarayananEmail verificata su google.com
- Matthias WählischProfessor and Chair of Distributed and Networked Systems, TU Dresden, BI Research FellowEmail verificata su tu-dresden.de
- Edith C. H. NgaiAssociate Professor, Dept. of Electrical and Electronic Engineering, The University of Hong KongEmail verificata su eee.hku.hk
- Edmund YehNortheastern UniversityEmail verificata su ece.neu.edu