Crea il mio profilo
Accesso pubblico
Visualizza tutto29 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Ahmed Hussen AbdelazizAppleEmail verificata su apple.com
- Martin HeckmannAalen University of Applied SciencesEmail verificata su hs-aalen.de
- Hendrik MeutznerRuhr-University BochumEmail verificata su rub.de
- Katharina KohlsRuhr University BochumEmail verificata su rub.de
- Rahim SaeidiPrincipal Data Scientist at ZscalerEmail verificata su zscaler.com
- Marc DelcroixNTT Communication Science LaboratoriesEmail verificata su ieee.org
- Tomohiro NakataniNTT Communication Science LaboratoriesEmail verificata su ieee.org
- Shinji WatanabeCarnegie Mellon UniversityEmail verificata su cmu.edu
- Reinhold Haeb-UmbachProfessor of Communications Engineering, University of PaderbornEmail verificata su nt.uni-paderborn.de
- Ning MaUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Alberto AbadINESC-ID, Instituto Superior Técnico, University of Lisbon, PortugalEmail verificata su l2f.inesc-id.pt
- Pejman MowlaeeLead Research ScientistEmail verificata su tugraz.at
- Heiko WersingHonda Research Institute EuropeEmail verificata su honda-ri.de
- Markus BärPhysikalisch-Technische Bundesanstalt (PTB); TU Berlin, Theoretical PhysicsEmail verificata su ptb.de
- Sebastian Gergenspexa GmbHEmail verificata su spexa.de
- Jike ChongCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Armin KohlrauschPhilips Research and TU EindhovenEmail verificata su philips.com
- John HersheyGoogle (formerly MERL, IBM, MSR, UCSD)Email verificata su google.com
- Emmanuel VincentSenior Research Scientist, InriaEmail verificata su inria.fr