Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Tihanyi NorbertEötvös Loránd University, Technology Innovation InstituteVerified email at inf.elte.hu
- Mohamed Amine Ferrag, PhD, SIEEEAssociate Professor of AI & Cybersecurity, Guelma UniversityVerified email at univ-guelma.dz
- Lucas C. CordeiroProfessor of Computer Science, University of ManchesterVerified email at manchester.ac.uk
- Merouane DebbahKU 6G Center, Khalifa University, CentralesupelecVerified email at centralesupelec.fr
- Tamas BisztrayPostdoctoral Researcher at University of OsloVerified email at ifi.uio.no
- thierry lestableTechnology Innovation InstituteVerified email at tii.ae
- Youcheng SunLecturer, University of ManchesterVerified email at manchester.ac.uk
- Yiannis CharalambousCasual Research Assistant, University of ManchesterVerified email at student.manchester.ac.uk
- Vasileios MavroeidisAssociate Professor of Cybersecurity, University of OsloVerified email at ifi.uio.no
- Mthandazo NdhlovuSenior Security Researcher, Technology Innovation InstituteVerified email at tii.ae
- Nicole GervasoniSenior Security Researcher, TIIVerified email at tii.ae
- Rahul PurandareAssociate Professor, University of Nebraska–LincolnVerified email at unl.edu
- Sanjay RawatUniversity of BristolVerified email at bristol.ac.uk
- Fatima AlwahediAssociate Researcher | TIIVerified email at tii.ae
- Vini KanvarIBM Research, IIT BombayVerified email at in.ibm.com
- Srikanth G TamilselvamIBM Research LabsVerified email at in.ibm.com
- Subodh SharmaIIT DelhiVerified email at cse.iitd.ac.in
- Venkatesh VinayakaraoLecturer, Chennai Mathematical Institute (CMI)Verified email at iiitd.ac.in
- Amith SingheeDirector, IBM Research, India. CTO IBM India and South AsiaVerified email at in.ibm.com
- Rebeka TóthUniversity of OsloVerified email at ifi.uio.no