Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mario KöppenKyushu Institute of TechnologyVerified email at ieee.org
Andrii ShalaginovKristiania University CollegeVerified email at kristiania.no
Lambert Schomakerprofessor of Artificial Intelligence, Bernoulli Institute, CogniGron Center, University of GroningenVerified email at rug.nl
Slobodan V. PetrovicGjøvikVerified email at ntnu.no
Sukalpa ChandaØstfold University CollegeVerified email at ieee.org
Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
Gonzalo AlvarezCSICVerified email at iec.csic.es
Carmen Torrano GiménezProfesora de Ciberseguridad y Blockchain, UNIRVerified email at unir.net
Isabelle GuyonDirector of Research, Google; Prof. UPSaclay; President ChaLearnVerified email at chalearn.org
André ÅrnesTelenor Group, NTNUVerified email at ntnu.no
Sargur (Hari) SrihariSUNY Dist. Prof., Dept. of Comp. Sci. & Engg, Dept. of Biostatistics, University at Buffalo, SUNYVerified email at buffalo.edu
Jan William JohnsenResearcher, Norwegian University of Science and TechnologyVerified email at ntnu.no
Ajith AbrahamSai University, IndiaVerified email at saiuniversity.edu.in
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
Steve WatsonVerified email at stevewatson.net
Radina (Adi) StoykovaUniversity of GroningenVerified email at rug.nl
Zeno Geradtsforensic scientistVerified email at uva.nl
Dr. Srikanta PalInformation and Communication Technology, Griffith University, AustraliaVerified email at griffithuni.edu.au
isuf deliuVerified email at stud.ntnu.no
Sergii BaninNorwegian University of Science and TechnologyVerified email at ntnu.no