Get my own profile
Co-authors
Mario KöppenKyushu Institute of TechnologyVerified email at ieee.org
Hai Thanh NguyenResearch scientist at Telenor ResearchVerified email at ntnu.no
Andrii ShalaginovKristiania University CollegeVerified email at kristiania.no
L.R.B. SchomakerUniversity of GroningenVerified email at rug.nl
Slobodan V. PetrovicGjøvikVerified email at hig.no
Umapada PalProfessor, Computer Vision and Pattern Recogniiton Unit, Indian Statistical Institute, KolkataVerified email at isical.ac.in
Sukalpa ChandaØstfold University CollegeVerified email at ieee.org
Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence (Tier2) - University of GuelphVerified email at uoguelph.ca
Gonzalo AlvarezCSICVerified email at iec.csic.es
Carmen Torrano GiménezProfesora de Ciberseguridad y Blockchain, UNIRVerified email at unir.net
Sargur (Hari) SrihariSUNY Dist. Prof., Dept. of Comp. Sci. & Engg, Dept. of Biostatistics, University at Buffalo, SUNYVerified email at buffalo.edu
Isabelle GuyonUniversité Paris-Saclay / INRIA / ChaLearnVerified email at chalearn.org
Dr. Srikanta PalInformation and Communication Technology, Griffith University, AustraliaVerified email at griffithuni.edu.au
Zeno Geradtsforensic scientistVerified email at uva.nl
Mauro ContiFull Professor at University of Padua - Affiliate Prof. at TU Delft and UW SeattleVerified email at math.unipd.it
Steve WatsonVerified email at stevewatson.net
Ajith AbrahamMachine Intelligence Research Labs (MIR Labs)Verified email at ieee.org
André ÅrnesTelenor Group, NTNUVerified email at ntnu.no
Larry YaegerProfessor of Informatics & Computing, Indiana UniversityVerified email at indiana.edu
Sriganesh MadhvanathDirector, Applied Research, eBay IncVerified email at acm.org