Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Behrang Barekatain (Associate Profes...Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University.Verified email at iaun.ac.ir
- Behzad AkbariAssociate Professor of Computer Engineering, Tarbiat Modares UniversityVerified email at modares.ac.ir
- Alicia Trivino CabreraUniversidad de Málaga (Spain)Verified email at uma.es
- Daniele AntonioliEURECOMVerified email at eurecom.fr
- Mohd Aizaini MaarofProfessor of Information Security, Universiti Teknologi Malaysia (UTM)- Research ID: L-4331-2013Verified email at utm.my
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Ferdinand BrasserSANCTUARY Systems GmbHVerified email at sanctuary.dev
- Alfonso Ariza QuintanaUniversidad de MálagaVerified email at uma.es
- Sridhar AdepuAssistant Professor at University of BristolVerified email at bristol.ac.uk
- Martín OchoaResearcherVerified email at 8ar.ch
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Dariush KhezrimotlaghAssistant Professor of MathematicsVerified email at psu.edu
- Abdollah Ghaffari SheshjavaniUniversity of TehranVerified email at ut.ac.ir
- Saman ZonouzAssociate Professor, Georgia TechVerified email at gatech.edu
- Luis GarciaAssistant Professor, School of Computing, University of UtahVerified email at gcloud.utah.edu
- Shaharuddin SallehProfessor of Computational MathematicsVerified email at utm.my
- Qamar NaithAssistant Professor in Software Engineering at University of JeddahVerified email at uj.edu.sa
- Saeed MoghimiNational Oceanic and Atmospheric AdministrationVerified email at noaa.gov