Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Philipp MayrGESIS - Leibniz Institute for the Social SciencesEmail verificata su gesis.org
- Guillaume CabanacProfessor of Computer Science, University of Toulouse & Institut Universitaire de FranceEmail verificata su univ-tlse3.fr
- Ulrich ThielFraunhofer IPA-PAMBEmail verificata su ipa.fraunhofer.de
- Mounia LalmasSpotifyEmail verificata su acm.org
- Haiming LiuUniversity of SouthamptonEmail verificata su soton.ac.uk
- Benjamin PiwowarskiCNRS, ISIR, Sorbonne UniversitéEmail verificata su piwowarski.fr
- Nicola FerroFull Professor, University of Padua, ItalyEmail verificata su dei.unipd.it
- Maristella AgostiProfessor Emerita of Computer Science, University of Padua, ItalyEmail verificata su unipd.it
- Zinnar GhasemLecturer -Computer Science and Information Technology, The American University of KurdistanEmail verificata su auk.edu.krd
- Massimo MelucciProfessor of Computer Science, University of Padua, ItalyEmail verificata su dei.unipd.it
- Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickEmail verificata su warwick.ac.uk
- Norbert FuhrUniv. Duisburg-EssenEmail verificata su uni-due.de
- Emanuele PanizziSapienza Università di RomaEmail verificata su di.uniroma1.it
- Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeEmail verificata su comp.nus.edu.sg
- Amit Kumar JaiswalIndian Institute of Technology (BHU) Varanasi, University College LondonEmail verificata su ucl.ac.uk
- Song DaweiOpen UniversityEmail verificata su tju.edu.cn
- Hanne AlbrechtsenCopenhagen UniversityEmail verificata su hum.ku.dk
- Haider M. al-KhateebAssociate Professor in Cyber Security, Aston UniversityEmail verificata su aston.ac.uk
- Peng ZhangProfessor, Tianjin UniversityEmail verificata su tju.edu.cn
- Muhammad Kamran AbbasiUniversity of SindhEmail verificata su usindh.edu.pk