Get my own profile
Public access
View all8 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Philipp MayrGESIS - Leibniz Institute for the Social SciencesVerified email at gesis.org
- Guillaume CabanacProfessor of Computer Science, University of Toulouse & Institut Universitaire de FranceVerified email at univ-tlse3.fr
- Ulrich ThielFraunhofer IPA-PAMBVerified email at ipa.fraunhofer.de
- Mounia LalmasSpotifyVerified email at acm.org
- Haiming LiuUniversity of SouthamptonVerified email at soton.ac.uk
- Benjamin PiwowarskiCNRS, ISIR, Sorbonne UniversitéVerified email at piwowarski.fr
- Nicola FerroFull Professor, University of Padua, ItalyVerified email at dei.unipd.it
- Maristella AgostiProfessor Emerita of Computer Science, University of Padua, ItalyVerified email at unipd.it
- Zinnar GhasemLecturer -Computer Science and Information Technology, The American University of KurdistanVerified email at auk.edu.krd
- Massimo MelucciProfessor of Computer Science, University of Padua, ItalyVerified email at dei.unipd.it
- Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
- Norbert FuhrUniv. Duisburg-EssenVerified email at uni-due.de
- Emanuele PanizziSapienza Università di RomaVerified email at di.uniroma1.it
- Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeVerified email at comp.nus.edu.sg
- Amit Kumar JaiswalIndian Institute of Technology (BHU) Varanasi, University College LondonVerified email at ucl.ac.uk
- Song DaweiOpen UniversityVerified email at tju.edu.cn
- Hanne AlbrechtsenCopenhagen UniversityVerified email at hum.ku.dk
- Haider M. al-KhateebAssociate Professor in Cyber Security, Aston UniversityVerified email at aston.ac.uk
- Peng ZhangProfessor, Tianjin UniversityVerified email at tju.edu.cn
- Muhammad Kamran AbbasiUniversity of SindhVerified email at usindh.edu.pk