Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mohamed Kashef (Mohamed Hany)National Institute of Standards and TechnologyEmail verificata su nist.gov
- Yongkang LiuFDAEmail verificata su uwaterloo.ca
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Henrik SandbergProfessor of Decision and Control Systems, KTH Royal Institute of TechnologyEmail verificata su kth.se
- Justin RuthsAssistant Professor of Mechanical Engineering and Systems Engineering, UT DallasEmail verificata su utdallas.edu
- Mustafa Amir FaisalProcter and GambleEmail verificata su pg.com
- Jairo GiraldoResearch Assistant Professor, University of UtahEmail verificata su utah.edu
- Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzEmail verificata su ucsc.edu
- Junia ValenteToyota Tsusho Systems US, Inc.Email verificata su toyota.com
- Jeanne QuimbyNational Institute of Standard and TechnologyEmail verificata su nist.gov
- Sebti Foufou, PhDProf. of Computer Science, University of Sharjah, UAEEmail verificata su sharjah.ac.ae
- Nader MoayeriNational Institute of Standards and TechnologyEmail verificata su nist.gov
- Zhibo PangABB Corporate Research, and KTH Royal Institute of Technology, SwedenEmail verificata su kth.se
- Shuvra S. BhattacharyyaProfessor of Electrical and Computer Engineering, University of MarylandEmail verificata su umd.edu
- Michele LuvisottoABB Corporate Research, SwedenEmail verificata su se.abb.com
- Xiaolin JiangEricsson ResearchEmail verificata su ericsson.com
- Carlo FischioneProfessor, KTH, EECS, Network and Systems EngineeringEmail verificata su kth.se
- Sajal BhatiaSacred Heart UniversityEmail verificata su sacredheart.edu
- Goncalo MartinsUniversity of Denver (USA)Email verificata su du.edu
- Xenofon KoutsoukosVanderbilt UniversityEmail verificata su vanderbilt.edu