Crea il mio profilo
Accesso pubblico
Visualizza tutto34 articoli
24 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- jianyong chenShenzhen universityEmail verificata su szu.edu.cn
- Jianwen XiangWuhan University of TechnologyEmail verificata su whut.edu.cn
- ABDELGHANI DAHOUUniversity Ahmed Draia - AdrarEmail verificata su univ-adrar.dz
- Guodong YeGuangdong Ocean University, ChinaEmail verificata su gdou.edu.cn
- Dongdong ZhaoWuhan University of TechnologyEmail verificata su whut.edu.cn
- Lm ChengAssociate Professor of Electronic Engineeing, Cit University of Hong KongEmail verificata su cityu.edu.hk
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTEmail verificata su tudelft.nl
- Dr. Mohamed Abd ElazizAssociate Professor, Galala UniversityEmail verificata su Gu.edu.eg
- qiuzhen linShenzhen UniversityEmail verificata su szu.edu.cn
- Xing TangWuhan University of TechnologyEmail verificata su my.cityu.edu.hk
- Prof Anthony TS HoProfessor of Multimedia SecurityEmail verificata su surrey.ac.uk
- Yoon-Ho ChoiProfessor of Computer Science and Engineering, Pusan National UniversityEmail verificata su pusan.ac.kr
- Zhilong WangThe Pennsylvania State UniversityEmail verificata su psu.edu
- Xinrong WuHuazhong University of Science and TechnologyEmail verificata su hust.edu.cn
- Manos PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichEmail verificata su greenwich.ac.uk
- QIAO YANShenzhen universityEmail verificata su szu.edu.cn
- Fei ChenShenzhen UniversityEmail verificata su szu.edu.cn
- F. Richard YuCarleton University, FCAE, MAE, FIEEE, FEICEmail verificata su carleton.ca