Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mario KöppenKyushu Institute of TechnologyEmail verificata su ieee.org
- Andrii ShalaginovKristiania University CollegeEmail verificata su kristiania.no
- Hai Thanh NguyenResearch scientist at Telenor ResearchEmail verificata su ntnu.no
- Lambert Schomakerprofessor of Artificial Intelligence, Bernoulli Institute, CogniGron Center, University of GroningenEmail verificata su rug.nl
- Slobodan V. PetrovicGjøvikEmail verificata su ntnu.no
- Sukalpa ChandaØstfold University CollegeEmail verificata su ieee.org
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphEmail verificata su uoguelph.ca
- Gonzalo AlvarezCSICEmail verificata su iec.csic.es
- Carmen Torrano GiménezProfesora de Ciberseguridad y Blockchain, UNIREmail verificata su unir.net
- Isabelle GuyonDirector of Research, Google; Prof. UPSaclay; President ChaLearnEmail verificata su chalearn.org
- Sargur (Hari) SrihariSUNY Dist. Prof., Dept. of Comp. Sci. & Engg, Dept. of Biostatistics, University at Buffalo, SUNYEmail verificata su buffalo.edu
- André ÅrnesTelenor Group, NTNUEmail verificata su ntnu.no
- Jan William JohnsenResearcher, Norwegian University of Science and TechnologyEmail verificata su ntnu.no
- Ajith AbrahamBennett University, IndiaEmail verificata su bennett.edu.in
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleEmail verificata su math.unipd.it
- Steve WatsonEmail verificata su stevewatson.net
- Radina (Adi) StoykovaUniversity of GroningenEmail verificata su rug.nl
- Zeno Geradtsforensic scientistEmail verificata su uva.nl
- Dr. Srikanta PalInformation and Communication Technology, Griffith University, AustraliaEmail verificata su griffithuni.edu.au
- isuf deliuEmail verificata su stud.ntnu.no