Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Igor LinkovUS Army Corps of EngineersEmail verificata su usace.army.mil
- Edward J. M. Colbert, Ph.D.Virginia TechEmail verificata su ecolbert.com
- Jeffrey M. KeislerUniversity of Massachusetts BostonEmail verificata su umb.edu
- Alberts DavidSenior Fellow IDA - President IC2IEmail verificata su internationalc2institute.org
- cliff wangNCSUEmail verificata su ncsu.edu
- Martin DrašarInstitute of Computer Science, Masaryk UniversityEmail verificata su mail.muni.cz
- Alexander A. GaninUniversity of VirginiaEmail verificata su virginia.edu
- Benoît LeBlancEnseignant/Chercheur à l'Ecole Nationale Supérieure de Cognitique (Bordeaux INP)Email verificata su ensc.fr
- Krzysztof RzadcaInstitute of Informatics, University of Warsaw and GoogleEmail verificata su mimuw.edu.pl
- Luigi Vincenzo ManciniUniversity Professor, Sapienza University of Rome, ItalyEmail verificata su di.uniroma1.it
- Nandi LesliePrincipal Technical Fellow, RTXEmail verificata su rtx.com
- Mauno PihelgasCyber Security Researcher, Systems EngineerEmail verificata su pihelgas.eu
- Rami S MangoubiC.S. Draper LaboratoryEmail verificata su draper.com
- Kenneth D. ForbusProfessor of Computer Science, Northwestern UniversityEmail verificata su northwestern.edu
- Daniel A. EisenbergAssistant Professor of Operations Research, Naval Postgraduate SchoolEmail verificata su nps.edu
- Thomas P SeagerAssociate Professor of Sustainable Engineering, Arizona State UniversityEmail verificata su asu.edu
- Prof. Alexander GutfraindLoyola University ChicagoEmail verificata su cornell.edu
- Emanuele MassaroEuropean Commission, Joint Research CentreEmail verificata su ec.europa.eu
- Tarek AbdelzaherUniversity of IllinoisEmail verificata su illinois.edu
- Fernando MaymiIronNet Cybersecurity, Inc.Email verificata su maymi.net