Get my own profile
Public access
View all20 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Mohamed HamdiUniversity of CarthageVerified email at supcom.rnu.tn
- Sandeep PirbhulalNorsk Regnesentral/Norwegian Computing CenterVerified email at nr.no
- Wolfgang LeisterActing Research Director, Norsk RegnesentralVerified email at nr.no
- Svetlana BoudkoNorsk RegnesentralVerified email at nr.no
- Stefan PosladAssociate Professor /Senior Lecturer, Queen Mary University of LondonVerified email at qmul.ac.uk
- Prof. Ilangko BalasinghamOslo University Hospital & Norwegian University of Science & Technology (NTNU)Verified email at medisin.uio.no
- Domenico RotondiGrifo Multimedia SrlVerified email at computer.org
- Stamatis KarnouskosSAP, IEEE FellowVerified email at sap.com
- Olli Pitkänen1001 Lakes OyVerified email at helsinki.fi
- Jaime DelgadoUniversitat Politècnica de CatalunyaVerified email at upc.edu
- Dimitrios TzovarasInformation Technologies InstituteVerified email at iti.gr
- Ankur ShuklaResearch Scientist, Department of Risk and Security (SEC-R), Institute for Energy Technology, HaldenVerified email at ife.no
- Antti EvestiVTTVerified email at vtt.fi
- Mattias Tsegaye GebrieUniversity of OsloVerified email at ifi.uio.no
- Lorenzo BlasiSenior Technical Consultant at Hewlett-Packard EnterpriseVerified email at hpe.com
- Enrico CambiasoConsiglio Nazionale delle RicercheVerified email at cnr.it
- Katrin FrankeNTNU - Norwegian University of Science and TechnologyVerified email at ntnu.no
- André ÅrnesTelenor Group, NTNUVerified email at ntnu.no
- Jens-Petter SandvikNational Criminal Investigation Service, NorwayVerified email at politiet.no
- Josef NollProfessor, Digital Transformation & Societal Security, University of OsloVerified email at its.uio.no