Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Mario KöppenKyushu Institute of TechnologyVerified email at ieee.org
- Andrii ShalaginovKristiania University CollegeVerified email at kristiania.no
- Hai Thanh NguyenResearch scientist at Telenor ResearchVerified email at ntnu.no
- Lambert Schomakerprofessor of Artificial Intelligence, Bernoulli Institute, CogniGron Center, University of GroningenVerified email at rug.nl
- Slobodan V. PetrovicGjøvikVerified email at ntnu.no
- Sukalpa ChandaØstfold University CollegeVerified email at ieee.org
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
- Gonzalo AlvarezCSICVerified email at iec.csic.es
- Carmen Torrano GiménezProfesora de Ciberseguridad y Blockchain, UNIRVerified email at unir.net
- Isabelle GuyonDirector of Research, Google; Prof. UPSaclay; President ChaLearnVerified email at chalearn.org
- Sargur (Hari) SrihariSUNY Dist. Prof., Dept. of Comp. Sci. & Engg, Dept. of Biostatistics, University at Buffalo, SUNYVerified email at buffalo.edu
- André ÅrnesTelenor Group, NTNUVerified email at ntnu.no
- Jan William JohnsenResearcher, Norwegian University of Science and TechnologyVerified email at ntnu.no
- Ajith AbrahamBennett University, IndiaVerified email at bennett.edu.in
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
- Steve WatsonVerified email at stevewatson.net
- Radina (Adi) StoykovaUniversity of GroningenVerified email at rug.nl
- Zeno Geradtsforensic scientistVerified email at uva.nl
- Dr. Srikanta PalInformation and Communication Technology, Griffith University, AustraliaVerified email at griffithuni.edu.au
- isuf deliuVerified email at stud.ntnu.no