Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Vladimir A. Oleshchukprofessor at University of AgderVerified email at acm.org
- Terje GjøsæterUniversity of Agder, OsloMetVerified email at uia.no
- Geir M. KøienProf. Cyber security, University of South-Eastern Norway (USN)Verified email at acm.org
- Christian ThomsenAssociate Professor, Computer Science, Aalborg UniversityVerified email at cs.aau.dk
- Emad Samuel Malki EbeidFull Professor, University of Southern Denmark, IEEE Senior Member.Verified email at sdu.dk
- Rune Hylsberg JacobsenProfessorVerified email at ece.au.dk
- Qi ZhangProfessor, Aarhus UniversityVerified email at ece.au.dk
- Lei JiaoProfessor of Information and Communication Technology, University of AgderVerified email at uia.no
- Ole-Christoffer GranmoProfessor University of AgderVerified email at uia.no
- Jaziar RadiantiProfessor, University of AgderVerified email at uia.no
- Christian S. JensenAalborg University, Department of Computer ScienceVerified email at cs.aau.dk
- Jennifer BettsQueens University BelfastVerified email at qub.ac.uk
- Torben Bach PedersenProfessor of Computer Science, Aalborg UniversityVerified email at cs.aau.dk