Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Muhammad Khurram BhattiAssociate Professor at University of Exeter, UKEmail verificata su exeter.ac.uk
- Vianney LapotreAssociate professor / Lab-STICCEmail verificata su univ-ubs.fr
- Ayaz AkramUniversity of California, DavisEmail verificata su ucdavis.edu
- Florent BruguierLIRMM, CNRS - University of MontpellierEmail verificata su lirmm.fr
- NOVO DavidLIRMM,University of Montpellier, and CNRSEmail verificata su lirmm.fr
- Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisEmail verificata su enst.fr
- Natasha AlkhatibCybersecurity researcher and engineer at ETAS BOSCHEmail verificata su telecom-paris.fr
- Hadi GhauchAssistant Professor, Telecom ParisTechEmail verificata su telecom-paristech.fr
- Maham ChaudhryStudentEmail verificata su itu.edu.pk
- Umer FarooqUniversity of Sunderland, UKEmail verificata su sunderland.ac.uk
- Muhammad Asim MukhtarInformation Technology UniversityEmail verificata su itu.edu.pk
- Naveed Bin RaisProfessor, Ajman UniversityEmail verificata su ajman.ac.ae
- Isil OzIzmir Institute of TechnologyEmail verificata su iyte.edu.tr
- Mats BrorssonUniversity of LuxembourgEmail verificata su uni.lu
- Lilian BossuetProfessor, University of Lyon, Saint-Etienne - Laboratoire Hubert Curien - CNRSEmail verificata su univ-st-etienne.fr
- Clémentine MauriceUniv Lille, CNRS, InriaEmail verificata su inria.fr
- Sylvain GUILLEYTELECOM-ParisTechEmail verificata su secure-ic.com
- Usman AliUniversity of ConnecticutEmail verificata su uconn.edu