Crea il mio profilo
Accesso pubblico
Visualizza tutto30 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
Ahmed Hussen AbdelazizAppleEmail verificata su apple.com
Martin HeckmannAalen University of Applied SciencesEmail verificata su hs-aalen.de
Hendrik MeutznerRuhr-University BochumEmail verificata su rub.de
Katharina KohlsRuhr University BochumEmail verificata su rub.de
Marc DelcroixNTT Communication Science LaboratoriesEmail verificata su ieee.org
Tomohiro NakataniNTT Communication Science LaboratoriesEmail verificata su ieee.org
Rahim SaeidiPrincipal Data Scientist at ZscalerEmail verificata su zscaler.com
Shinji WatanabeCarnegie Mellon UniversityEmail verificata su cmu.edu
Reinhold Haeb-UmbachProfessor of Communications Engineering, University of PaderbornEmail verificata su nt.uni-paderborn.de
Ning MaUniversity of SheffieldEmail verificata su sheffield.ac.uk
Alberto AbadINESC-ID, Instituto Superior Técnico, University of Lisbon, PortugalEmail verificata su l2f.inesc-id.pt
Pejman MowlaeeLead Research ScientistEmail verificata su tugraz.at
Heiko WersingHonda Research Institute EuropeEmail verificata su honda-ri.de
Markus BärPhysikalisch-Technische Bundesanstalt (PTB); TU Berlin, Theoretical PhysicsEmail verificata su ptb.de
Sebastian Gergenspexa GmbHEmail verificata su spexa.de
Armin KohlrauschPhilips Research and TU EindhovenEmail verificata su philips.com
Jike ChongCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
John HersheyGoogle (formerly MERL, IBM, MSR, UCSD)Email verificata su google.com
Emmanuel VincentSenior Research Scientist, InriaEmail verificata su inria.fr