Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Vladimir A. Oleshchukprofessor at University of AgderVerified email at acm.org
Terje GjøsæterUniversity of Agder, OsloMetVerified email at uia.no
Geir M. KøienProf. Cyber security, University of South-Eastern Norway (USN)Verified email at acm.org
Christian ThomsenAssociate Professor, Computer Science, Aalborg UniversityVerified email at cs.aau.dk
Emad Samuel Malki EbeidFull Professor, University of Southern DenmarkVerified email at sdu.dk
Rune Hylsberg JacobsenProfessorVerified email at ece.au.dk
Qi ZhangAssociate Professor, Aarhus UniversityVerified email at ece.au.dk
Lei JiaoProfessor of Information and Communication Technology, University of AgderVerified email at uia.no
Ole-Christoffer GranmoProfessor University of AgderVerified email at uia.no
Jaziar RadiantiProfessor, University of AgderVerified email at uia.no
Christian S. JensenAalborg University, Department of Computer ScienceVerified email at cs.aau.dk
Jennifer BettsQueens University BelfastVerified email at qub.ac.uk
Torben Bach PedersenProfessor of Computer Science, Aalborg UniversityVerified email at cs.aau.dk