Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ulrik FrankeRISE Research Institutes of Sweden, KTH Royal Institute of TechnologyEmail verificata su ri.se
- Fredrik JohanssonSenior Scientist @ Swedish Defence Research Agency (FOI)Email verificata su foi.se
- Henrik ArtmanKTH (Royal Institute of Technology)Email verificata su kth.se
- Sinna LindquistFOI - Swedish Defence Research Institute Email verificata su kth.se
- Lisa KaatiStockholm UniversityEmail verificata su dsv.su.se
- Christian MårtensonFOIEmail verificata su foi.se
- Pontus SvensonRISE SICSEmail verificata su ri.se
- Andreas HorndahlFOIEmail verificata su foi.se
- Marianela García LozanoSenior Scientist at FOIEmail verificata su kth.se
- Steve CooperProfessor, School of Computing, University of Nebraska - LincolnEmail verificata su unl.edu
- Ali AbdallahProfessor of Information SecurityEmail verificata su bcu.ac.uk
- Lance HoffmanDistinguished Research Professor of Computer Science, The George WashingtonUniversityEmail verificata su email.gwu.edu
- Matt BishopUniversity of California at DavisEmail verificata su ucdavis.edu
- Susanne WetzelProfessor of Computer Science, Stevens Institute of TechnologyEmail verificata su acm.org
- Björn JE JohanssonProfessor, Linköping UniversityEmail verificata su liu.se
- Shambhu UpadhyayaProfessor of Computer Science and Engineering, University at BuffaloEmail verificata su buffalo.edu
- Youry KhmelevskyProfessor, Computer Science, Okanagan CollegeEmail verificata su okanagan.bc.ca
- Anders LundströmAssociate Professor in Interaction Design @ Informatics Department in Umeå UniversityEmail verificata su kth.se
- Rego GranlundPhD, SICS EastEmail verificata su santaanna.se