Get my own profile
Public access
View all55 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Gregorio Martinez PerezFull Professor of Computer Science, University of Murcia, SpainVerified email at um.es
- Pedro Miguel Sanchez SanchezPostdoctoral Researcher, University of MurciaVerified email at um.es
- Gérôme Bovetarmasuisse, Cyber-Defence CampusVerified email at armasuisse.ch
- Manuel Gil PérezAssociate Professor, University of Murcia, SpainVerified email at um.es
- Felix J. Garcia ClementeFull Professor of Computer Engineering, University of MurciaVerified email at um.es
- Sergio López BernalSenior researcher, University of MurciaVerified email at um.es
- Lorenzo Fernández MaimóAssociate Professor of Computer Science. University of Murcia.Verified email at um.es
- Enrique Tomás Martínez BeltránPhD student in Computer Science, University of MurciaVerified email at um.es
- Ángel Luis Perales GómezUniversidad de MurciaVerified email at um.es
- José María Jorquera ValeroSenior Researcher, Universidad de MurciaVerified email at um.es
- Mario Quiles PerezPhD Student, University of MurciaVerified email at um.es
- Jan von der AssenUniversity of ZurichVerified email at ifi.uzh.ch
- Chao FengUniversity of ZurichVerified email at ifi.uzh.ch
- Félix Gómez MármolAssociate Professor, University of MurciaVerified email at um.es
- Pantaleone NespoliUniversity of MurciaVerified email at um.es
- Muriel Figueredo FrancoFederal University of Rio Grande do SulVerified email at inf.ufrgs.br
- Eder John ScheidFederal University of Rio Grande do Sul (UFRGS)Verified email at inf.ufrgs.br
- Kallol Krishna KarmakarLecturer in Cybersecurity (TNE), Deakin UniversityVerified email at deakin.edu.au
- Lisandro Zambenedetti GranvilleFull Professor of Computer Science, Federal University of Rio Grande do SulVerified email at inf.ufrgs.br