Get my own profile
Public access
View all16 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Andrei GurtovProfessor, Linköping universityVerified email at acm.org
- Mika YlianttilaProfessor, University of OuluVerified email at oulu.fi
- Madhusanka LiyanageAssociate Professor/Ad Astra Fellow (University College Dublin, Ireland)Verified email at ucd.ie
- Lee HoonJaeProf. of Dept. Information Security, Dongseo Univ.Verified email at dongseo.ac.kr
- An BraekenVrije Universiteit BrusselVerified email at vub.be
- Pawani PorambageSenior Scientist (VTT Technical Research Centre Finland) and Docent (University of Oulu)Verified email at vtt.fi
- Mangal SainDongseo University, Busan, South KoreaVerified email at dongseo.ac.kr
- Gurjot Singh GabaPost Doctoral Researcher at Linköping University, SwedenVerified email at liu.se
- Corinna SchmittResearch Institute CODE, Universität der Bundeswehr MünchenVerified email at unibw.de
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
- Jari IinattiProfessor of Communications Engineering, University of Oulu, Oulu, FinlandVerified email at oulu.fi
- Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
- Sang-Gon LeeDongseo UniversityVerified email at dongseo.ac.kr
Follow