Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Karl MeinkeProfessor of Computer Science KTH Royal Institute of TechnologyEmail verificata su kth.se
- Soumajit PalCenter for Cyber Security, Amrita UniversityEmail verificata su am.amrita.edu
- Hrudya PResearch Associate at CISAI, Amrita Vishwa VidyapeethamEmail verificata su am.amrita.edu
- surendran kAmrita Center for Cyber SecurityEmail verificata su am.amrita.edu
- Thara SAssistant Professor, Amrita Vishwa VidyapeethamEmail verificata su am.amrita.edu
- Gregory L. HeilemanUniversity of ArizonaEmail verificata su arizona.edu
- Prabaharan P (Praba) PhD, CISSP, CI...Amrita University, Amrita Vishwa VidyapeethamEmail verificata su am.amrita.edu
- rachael sugarsAssociate Professor, Karolinska InstitutetEmail verificata su ki.se
- Soman K.PHead, CEN, AMRITA VISHWA VIDYAPEETHAMEmail verificata su amrita.edu
- Sai Sreewathsa KovalluriAmrita Vishwa VidyapeethamEmail verificata su am.amrita.edu
- Sreeram Rajendran/e/ FoundationEmail verificata su e.email
- Shivsubramani KrishnamoorthyAmrita Vishwa Vidyapeetham (Amrita University), IndiaEmail verificata su amrita.edu