Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Siraj Ahmed ShaikhSwansea UniversityEmail verificata su swansea.ac.uk
- Markus RoggenbachProfessor of Computer Science, Swansea UniversityEmail verificata su swan.ac.uk
- Natasha AlechinaDepartment of Information and Computing Sciences, University of UtrechtEmail verificata su uu.nl
- Brian LoganNottingham UniversityEmail verificata su cs.nott.ac.uk
- Abdur RakibCoventry UniversityEmail verificata su coventry.ac.uk
- Helen TreharneProfessor, Surrey Centre for Cyber SecurityEmail verificata su surrey.ac.uk
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyEmail verificata su surrey.ac.uk
- Jeremy BryansResearch Fellow, Coventry University, UKEmail verificata su coventry.ac.uk
- Franco RaimondiProfessor of Computer Science, Gran Sasso Science InstituteEmail verificata su gssi.it
- Harsha KalutarageSchool of Computing, Robert Gordon University, Aberdeen, UKEmail verificata su rgu.ac.uk
- Nils BullingTU ClausthalEmail verificata su in.tu-clausthal.de
- Tran Dinh KhangHanoi University of Science and TechnologyEmail verificata su soict.hust.edu.vn
- Jorge Blasco AlísAssociate Professor, Universidad Politécnica de MadridEmail verificata su upm.es
- Matthew TrumbleUniversity of SurreyEmail verificata su surrey.ac.uk
- Anne E. HaxthausenAssociate Professor of Computer Science, Technical University of DenmarkEmail verificata su dtu.dk
- Leonardo MostardaAssociate professor, university of PerugiaEmail verificata su unipg.it