Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Vladimir A. Oleshchukprofessor at University of AgderVerified email at acm.org
Terje GjøsæterUniversity of Agder, OsloMetVerified email at uia.no
Geir M. KøienProf. Cyber security, University of South-Eastern Norway (USN)Verified email at acm.org
Christian ThomsenAssociate Professor, Computer Science, Aalborg UniversityVerified email at cs.aau.dk
Ole-Christoffer GranmoProfessor University of AgderVerified email at uia.no
Qi ZhangAssociate Professor, Aarhus UniversityVerified email at ece.au.dk
Lei JiaoAssociate Professor of Information and Communication Technology, University of AgderVerified email at uia.no
Emad Samuel Malki EbeidAssociate Professor, University of Southern DenmarkVerified email at mmmi.sdu.dk
Rune Hylsberg JacobsenAssociate ProfessorVerified email at ece.au.dk
Jaziar RadiantiAssociate Professor, University of AgderVerified email at uia.no
Christian S. JensenAalborg University, Department of Computer ScienceVerified email at cs.aau.dk
Jennifer BettsQueens University BelfastVerified email at qub.ac.uk
Torben Bach PedersenProfessor of Computer Science, Aalborg UniversityVerified email at cs.aau.dk