Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mohamed Amine Ferrag, PhD, SIEEETeam Leader, Technology Innovation InstituteEmail verificata su ieee.org
- Tihanyi NorbertEötvös Loránd UniversityEmail verificata su inf.elte.hu
- Lucas C. CordeiroReader, Dept of Computer Science, University of ManchesterEmail verificata su manchester.ac.uk
- Tamas BisztrayPhD Research Fellow at University of OsloEmail verificata su ifi.uio.no
- Rahul PurandareAssociate Professor, University of Nebraska–LincolnEmail verificata su unl.edu
- Youcheng SunLecturer, University of ManchesterEmail verificata su manchester.ac.uk
- Yiannis CharalambousCasual Research Assistant, University of ManchesterEmail verificata su student.manchester.ac.uk
- Nicole GervasoniSecurity Researcher, TIIEmail verificata su tii.ae
- Vasileios MavroeidisAssociate Professor of Cybersecurity, University of OsloEmail verificata su ifi.uio.no
- Sanjay RawatUniversity of BristolEmail verificata su bristol.ac.uk
- Mthandazo NdhlovuSenior Security Researcher, Technology Innovation InstituteEmail verificata su tii.ae
- Venkatesh VinayakaraoLecturer, Chennai Mathematical Institute (CMI)Email verificata su iiitd.ac.in
- Srikanth G TamilselvamIBM Research LabsEmail verificata su in.ibm.com
- Subodh SharmaIIT DelhiEmail verificata su cse.iitd.ac.in
- Amith SingheeDirector, IBM Research, India and Singapore. CTO IBM India and South AsiaEmail verificata su in.ibm.com
- Vini KanvarIBM Research, IIT Bombay
- Shivali AgarwalIBM ResearchEmail verificata su in.ibm.com
- Merouane DebbahKU 6G Center, Khalifa University, CentralesupelecEmail verificata su centralesupelec.fr