Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Vladimir A. Oleshchukprofessor at University of AgderEmail verificata su acm.org
- Terje GjøsæterUniversity of Agder, OsloMetEmail verificata su uia.no
- Geir M. KøienProf. Cyber security, University of South-Eastern Norway (USN)Email verificata su acm.org
- Christian ThomsenAssociate Professor, Computer Science, Aalborg UniversityEmail verificata su cs.aau.dk
- Rune Hylsberg JacobsenProfessorEmail verificata su ece.au.dk
- Emad Samuel Malki EbeidFull Professor, University of Southern DenmarkEmail verificata su sdu.dk
- Qi ZhangAssociate Professor, Aarhus UniversityEmail verificata su ece.au.dk
- Lei JiaoProfessor of Information and Communication Technology, University of AgderEmail verificata su uia.no
- Ole-Christoffer GranmoProfessor University of AgderEmail verificata su uia.no
- Jaziar RadiantiProfessor, University of AgderEmail verificata su uia.no
- Christian S. JensenAalborg University, Department of Computer ScienceEmail verificata su cs.aau.dk
- Jennifer BettsQueens University BelfastEmail verificata su qub.ac.uk
- Torben Bach PedersenProfessor of Computer Science, Aalborg UniversityEmail verificata su cs.aau.dk