Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mario KöppenKyushu Institute of TechnologyVerified email at ieee.org
Hai Thanh NguyenResearch scientist at Telenor ResearchVerified email at ntnu.no
Andrii ShalaginovKristiania University CollegeVerified email at kristiania.no
Lambert Schomakerprofessor of Artificial Intelligence, University of GroningenVerified email at rug.nl
Slobodan V. PetrovicGjřvikVerified email at hig.no
Sukalpa ChandaŘstfold University CollegeVerified email at ieee.org
Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence - University of Guelph, ON, CanadaVerified email at uoguelph.ca
Gonzalo AlvarezCSICVerified email at iec.csic.es
Carmen Torrano GiménezProfesora de Ciberseguridad y Blockchain, UNIRVerified email at unir.net
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
Sargur (Hari) SrihariSUNY Dist. Prof., Dept. of Comp. Sci. & Engg, Dept. of Biostatistics, University at Buffalo, SUNYVerified email at buffalo.edu
André ĹrnesTelenor Group, NTNUVerified email at ntnu.no
Jan William JohnsenResearcher, Norwegian University of Science and TechnologyVerified email at ntnu.no
Steve WatsonVerified email at stevewatson.net
Ajith AbrahamFLAME University, IndiaVerified email at flame.edu.in
Zeno Geradtsforensic scientistVerified email at uva.nl
Dr. Srikanta PalInformation and Communication Technology, Griffith University, AustraliaVerified email at griffithuni.edu.au
Sergii BaninNorwegian University of Science and TechnologyVerified email at ntnu.no
isuf deliuVerified email at stud.ntnu.no
Cor VeenmanTNO, Leiden UniversityVerified email at liacs.leidenuniv.nl