Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Behrang Barekatain (Associate Profes...Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University.Verified email at iaun.ac.ir
Behzad AkbariAssociate Professor of Computer Engineering, Tarbiat Modares UniversityVerified email at modares.ac.ir
Alicia Trivino CabreraUniversidad de Málaga (Spain)Verified email at uma.es
Daniele AntonioliEURECOMVerified email at eurecom.fr
Mohd Aizaini MaarofProfessor of Information Security, Universiti Teknologi Malaysia (UTM)- Research ID: L-4331-2013Verified email at utm.my
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Ferdinand BrasserSANCTUARY Systems GmbHVerified email at sanctuary.dev
Alfonso Ariza QuintanaUniversidad de MálagaVerified email at uma.es
Sridhar AdepuAssistant Professor at University of BristolVerified email at bristol.ac.uk
Martín OchoaZurich University of Applied SciencesVerified email at 8ar.ch
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Dariush KhezrimotlaghAssistant Professor of MathematicsVerified email at psu.edu
Abdollah Ghaffari SheshjavaniUniversity of TehranVerified email at ut.ac.ir
Saman ZonouzAssociate Professor, Georgia TechVerified email at gatech.edu
Luis GarciaAssistant Professor, School of Computing, University of UtahVerified email at utah.edu
Shaharuddin SallehProfessor of Computational MathematicsVerified email at utm.my
Qamar NaithAssistant Professor in Software Engineering at University of JeddahVerified email at uj.edu.sa
Saeed MoghimiNational Oceanic and Atmospheric AdministrationVerified email at noaa.gov