Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jose SuchProfessor of Computer Science, King's College London & VRAIN-UPVEmail verificata su kcl.ac.uk
- Awais RashidProfessor, Department of Computer Science, University of Bristol, UKEmail verificata su bristol.ac.uk
- Antonios GouglidisAssociate Professor, Lancaster UniversityEmail verificata su lancaster.ac.uk
- William KnowlesLancaster UniversityEmail verificata su williamknowles.io
- Nicholas MicallefLecturer in Computer Science, Swansea UniversityEmail verificata su swansea.ac.uk
- Hamed BalogunUniversity of Central LancashireEmail verificata su uclan.ac.uk
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowEmail verificata su ieee.org
- Shlomo BerkovskyMacquarie UniversityEmail verificata su mq.edu.au
- Erwin AdiDeloitte Risk Advisory Pty LtdEmail verificata su deloitte.com.au
- Kopo M. RamokapaneUniversity of BristolEmail verificata su bristol.ac.uk
- Sören PreibuschMeta ← Google ← Microsoft Research ← University of CambridgeEmail verificata su fb.com
- Marianne JungerChair of Cyber Security and Business ContinuityEmail verificata su utwente.nl
- Lorena MontoyaUniversity of TwenteEmail verificata su utwente.nl
- Matteo MigliavaccaUniversity of KentEmail verificata su kent.ac.uk
- Fernando OteroReader, University of KentEmail verificata su kent.ac.uk
- Jose M. del AlamoAssociate Professor (UPM)Email verificata su upm.es
- Borja BalleDeepMindEmail verificata su google.com
- Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Email verificata su tudelft.nl
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUEmail verificata su cmu.edu