Crea il mio profilo
Accesso pubblico
Visualizza tutto0 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- H. Afifi, Hossam Afifi , Hossam A.Professor in Computer Science, Télécom SudParis, Institut Polytechnique de ParisEmail verificata su mines-telecom.fr
- Emad Abd-ElrahmanProfessor at Computer & Systems Department NTI-Egypt (previous: IMT Institut MinesEmail verificata su nti.sci.eg
- Ahmed E. KamalRichardson Professor of Electrical and Computer Engineering, Iowa State UniversityEmail verificata su iastate.edu
- Makhlouf HadjiIRT SystemXEmail verificata su irt-systemx.fr
- William DiegoCellnexEmail verificata su cellnextelecom.com
- Sahar HoteitAssociate Professor at Paris SACLAY University/ CentraleSupélecEmail verificata su l2s.centralesupelec.fr
- Veronique VequeFull Professor, Université Paris-SaclayEmail verificata su universite-paris-saclay.fr
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaEmail verificata su ericsson.com
- Fan Li (李凡)Professor of School of Computer Science, Beijing Institute of TechnologyEmail verificata su bit.edu.cn
- Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Email verificata su mbzuai.ac.ae
- Hakima KhelifiUniversity Mohamed El Bachir El Ibrahimi of Bordj Bou ArreridjEmail verificata su univ-bba.dz
- Kashif SharifBeijing Institute of Technology, ChinaEmail verificata su bit.edu.cn
- Patrick William BrownOrangeEmail verificata su inria.fr
- francesca bassiIRT SystemXEmail verificata su irt-systemx.fr
- Abou-bakr DJAKERUniversity of Oran1 Ahmed Ben Bella, Oran, AlgeriaEmail verificata su edu.univ-oran1.dz
- Kechar BouabdellahFull Professor in Computer Science - Networking, University of ORAN1Email verificata su univ-oran1.dz