Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeVerified email at tees.ac.uk
- HAZEM MIGDADYProfessor of Computer Science, Oman College of Management and technologyVerified email at siu.edu
- Hussam N. FakhouriUniversity of Petra, Assistant Professor of Artificial intelligence and data scienceVerified email at uop.edu.jo
- Prof.Basim AlhadidiAl-Balqa Applied UniversityVerified email at bau.edu.jo
- Prof. Yahya M. TashtoushJordan University of Science and TechnologyVerified email at just.edu.jo
- Section on Formal Methods, DTU Com...Technical University of DenmarkVerified email at dtu.dk
- Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
- Hanne Riis Nielsonprofessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk