Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Andrey ChechulinHead of the International Digital Forensics Center at St.Petersburg Federal Research Center of theEmail verificata su comsec.spb.ru
- Elena DoynikovaSt. Petersburg Institute for Informatics and Automation of theEmail verificata su comsec.spb.ru
- Vasily DesnitskySPIIRASEmail verificata su comsec.spb.ru
- Andrey FedorchenkoSt.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), Laboratory of Computer Security ProblemsEmail verificata su comsec.spb.ru
- Maxim KolomeetsNewcastle UniversityEmail verificata su newcastle.ac.uk
- Alexander UlanovHP LabsEmail verificata su hp.com
- Victor SkorminDistinguished Service Professor of Electrical Engineering Binghamton UniversityEmail verificata su binghamton.edu
- Gustavo Gonzalez GranadilloAtos SpainEmail verificata su atos.net
- Jose Fran. RuizAtosEmail verificata su atos.net
- Antonio MañaProfessor of Computer Science, University of MalagaEmail verificata su lcc.uma.es
- Pavel LaskovUniversity of LiechtensteinEmail verificata su uni.li
- Klaus-Robert MüllerGoogle Deepmind & TU Berlin & Korea University & Max Planck Institute for Informatics, GermanyEmail verificata su tu-berlin.de
- Christin Schäferacs plus GmbHEmail verificata su acs-plus.de
- Hervé DebarProfesseur, Télécom SudParis, Institut Mines-Télécom, Institut Polytechnique de ParisEmail verificata su telecom-sudparis.eu
- James Bret MichaelProfessor of Computer Science, Naval Postgraduate SchoolEmail verificata su nps.edu
- Krzysztof SzczypiorskiWarsaw University of Technology, PolandEmail verificata su pw.edu.pl
- Rafal LeszczynaProfesor, Politechnika GdańskaEmail verificata su zie.pg.gda.pl