Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ioannis MavridisProfessor, University of Macedonia, Thessaloniki, GreeceVerified email at uom.gr
- P FoulirasUniversity of Macedonia,Verified email at uom.edu.gr
- Dimitris A. GritzalisProfessor of Cybersecurity, Athens University of Economics & BusinessVerified email at aueb.gr
- Aleš ČernivecResearcher at XLABVerified email at xlab.si
- Stavros SalonikiasInformation Security Research Group, University of MacedoniaVerified email at uom.edu.gr
- Evangelos K. MarkakisElectrical & Computer Engineering, Hellenic Mediterranean UniversityVerified email at hmu.gr
- Dimitrios TzovarasInformation Technologies InstituteVerified email at iti.gr
- Υannis NikoloudakisResearch Associate @ Pasiphae Lab, Hellenic Mediterranean University of Crete, Heraklion, GreeceVerified email at pasiphae.eu
- Anargyros SiderisVerified email at icsd.aegean.gr
- Nikolaos ZotosFuture Intelligence LtdVerified email at f-in.gr
- Anastasios DrosouCERTH-ITIVerified email at iti.gr
- Konstantinos M. GiannoutakisDepartment of Applied Informatics, University of MacedoniaVerified email at uom.edu.gr
- Evangelos PallisDepartment of Industrial Design and Production Engineering, University of West AtticaVerified email at uniwa.gr