Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ioannis PsarasResearch Scientist, Protocol LabsVerified email at protocol.ai
- Alberto SonninoResearcher, University College LondonVerified email at ucl.ac.uk
- Onur AscigilLancaster University, University College LondonVerified email at lancaster.ac.uk
- Etienne RivièreProfessor, UCLouvainVerified email at uclouvain.be
- Sergi Reñé VicenteDataHop LabsVerified email at datahop.network
- Dirk KutscherThe Hong Kong University of Science and Technology (Guangzhou)Verified email at dkutscher.net
- Enrico NatalizioChief Researcher @ TII, Abu Dhabi, UAE and Full Professor @ UL, Nancy, FranceVerified email at inria.fr
- Argyrios G. TasiopoulosUnaffiliatedVerified email at ucl.ac.uk
- Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagVerified email at imag.fr
- Mustafa Al-BassamUniversity College LondonVerified email at ucl.ac.uk
- Milan ErdeljConsultant @ SCILYNXVerified email at scilynx.com
- Franck RousseauUniv. Grenoble Alpes - Grenoble INP EnsimagVerified email at imag.fr
- Lixia ZhangProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
- Spyridon MastorakisUniversity of Notre DameVerified email at nd.edu
- Eryk SchillerUniversity of Applied Sciences of Western SwitzerlandVerified email at hes-so.ch
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Bernard TourancheauProfesseur Université Grenoble Alpes - UMR CNRS LIG - LIGlab.fr - Drakkar.imag.frVerified email at univ-grenoble-alpes.fr
- Mališa Vučinić Research Scientist, InriaVerified email at inria.fr
- Lei ZhongToyota Motor CorporationVerified email at toyota-tokyo.tech
- Cristian BorceaProfessor, Department of Computer Science, New Jersey Institute of TechnologyVerified email at njit.edu