Crea il mio profilo
Accesso pubblico
Visualizza tutto71 articoli
72 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Thippa Reddy Gadekallu, SMIEEEChief Engineer, Zhongda Group, Jiaxing, ChinaEmail verificata su zhongda.cn
Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, GA, USAEmail verificata su kennesaw.edu
Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphEmail verificata su uoguelph.ca
Youcef DjenouriAssociate Professor at University of South-Eastern Norway, Senior Researcher at NORCEEmail verificata su usn.no
Ashutosh Dhar DwivediAalborg UniversityEmail verificata su es.aau.dk
Abbas YazdinejadPostdoctoral Research Fellow at University of TorontoEmail verificata su utoronto.ca
Dawid PołapFaculty of Applied Mathematics, Sillesian University of TechnologyEmail verificata su polsl.pl
Mohamed BazaCollege of CharlestonEmail verificata su cofc.edu
Jorge CrichignoCollege of Engineering and Computing, University of South CarolinaEmail verificata su cec.sc.edu
Rajani SinghCopenhagen Business SchoolEmail verificata su cbs.dk
Lukas MalinaBrno University of TechnologyEmail verificata su vut.cz
Vijay MagoAssociate Professor, York UniversityEmail verificata su yorku.ca
Chandra Segar Thirumalai, Top 2 Glo...Vellore Institute of TechnologyEmail verificata su vit.ac.in
Petr DzurendaBrno University of TechnologyEmail verificata su vut.cz
Bruce KapronProfessor of Computer Science, University of VictoriaEmail verificata su uvic.ca
Sean ChesterUniversity of VictoriaEmail verificata su uvic.ca
Eman S. A. AbuJaradPh.D. of MathematicsEmail verificata su vub.be
Alex ThomoProfessor of Computer Science, University of VictoriaEmail verificata su cs.uvic.ca
Toshiyuki AMAGASAUniversity of TsukubaEmail verificata su cs.tsukuba.ac.jp