Crea il mio profilo
Accesso pubblico
Visualizza tutto57 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nicholas KolokotronisUniversity of the Peloponnese, Department of Informatics and TelecommunicationsEmail verificata su uop.gr
- Gueltoum BendiabUniversity of Frères MentouriEmail verificata su umc.edu.dz
- Bogdan GhitaUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Konstantinos LimniotisHellenic Data Protection AuthorityEmail verificata su di.uoa.gr
- Besfort ShalaFrankfurt University of Applied SciencesEmail verificata su e-technik.org
- Ulrich TrickProf. Dr.-Ing., Frankfurt University of Applied SciencesEmail verificata su trick-online.de
- Emanuele BelliniUniversity of Roma Tre, Khalifa University Fellow, IEEE SMC TCHS, IEEE-CSREmail verificata su ieee.org
- Basil PapadopoulosProfessor of Mathematics and Statistics,Democritus University of ThraceEmail verificata su civil.duth.gr
- Vasilis KatosBournemouth UniversityEmail verificata su bournemouth.ac.uk
- Muhammad AliAnglia Ruskin UniversityEmail verificata su aru.ac.uk
- Maria PapadakiAssociate Professor in Cyber Security, University of DerbyEmail verificata su derby.ac.uk
- Ievgeniia KuzminykhKing's College London, Department of InformaticsEmail verificata su nure.ua
- Stavros StavrouProfessor, Open University of CyprusEmail verificata su ouc.ac.cy
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthEmail verificata su plymouth.ac.uk
- Panagiotis SarigiannidisAssociate Professor, University of Western MacedoniaEmail verificata su uowm.gr