Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- 김병서 (Byung-Seo Kim)Hongik UniversityEmail verificata su hongik.ac.kr
- Muhammad Atif Ur RehmanAssistant Professor of Distributed Networking and Computing at Manchester Metropolitan University UKEmail verificata su mmu.ac.uk
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaEmail verificata su ericsson.com
- Blesson VargheseReader in Computer Science, University of St Andrews, UKEmail verificata su st-andrews.ac.uk
- Peter KilpatrickReader in Computer Science, Queen's University BelfastEmail verificata su qub.ac.uk
- Ivor SpenceReader in Computer Science, Queens University BelfastEmail verificata su qub.ac.uk
- Spyridon MastorakisUniversity of Notre DameEmail verificata su nd.edu
- Paul HarveyRakuten MobileEmail verificata su rakuten.com
- Bill BuchananProfessor of Cryptography, Edinburgh Napier UniversityEmail verificata su napier.ac.uk
- Jawad AhmadEdinburgh Napier UniversityEmail verificata su napier.ac.uk
- Yasir FaheemAssociate Professor, SEAST, Canadian University Dubai, UAEEmail verificata su seecs.edu.pk
- Balázs SonkolyMTA-BME Network Softwarization Research Group, Budapest University of Technology and EconomicsEmail verificata su tmit.bme.hu
- Robert SzaboEricsson Research & Budapest University of Technology and EconomicsEmail verificata su ericsson.com
- Janos TapolcaiFull Professor of Budapest University of Technology and Economics, MTA-BME Future Internet ResearchEmail verificata su tmit.bme.hu
- Di WuUniversity of St AndrewsEmail verificata su st-andrews.ac.uk
Segui
Rehmat Ullah
Asst. Prof. & Head of Intelligent Edge Computing Research Group at Cardiff Metropolitan University
Email verificata su cardiffmet.ac.uk - Home page