Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Thomas M. ChenProfessor in Cyber Security, City, University of LondonVerified email at city.ac.uk
- Juan TapiadorUniversidad Carlos III de MadridVerified email at inf.uc3m.es
- Guillermo Suarez-TangilAssistant Professor, IMDEA Networks InstituteVerified email at imdea.org
- Pedro Peris-LopezProfessor, Computer Science Department, Carlos III University of MadridVerified email at inf.uc3m.es
- Agustín OrfilaAssociate Professor of Computer Science, Universidad Carlos III de MadridVerified email at inf.uc3m.es
- Jose Maria de FuentesAssociate Professor, Universidad Carlos III de Madrid (Spain)Verified email at inf.uc3m.es
- Sergio PastranaAssociate ProfessorVerified email at inf.uc3m.es
- Julio Hernandez-CastroProfessor of Computer Security, University of KentVerified email at kent.ac.uk
- Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
- Markus RoggenbachProfessor of Computer Science, Swansea UniversityVerified email at swan.ac.uk
- Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
- Harsha KalutarageSchool of Computing, Robert Gordon University, Aberdeen, UKVerified email at rgu.ac.uk
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
- Hugo GascónGerman Edge Cloud, ICAI School of EngineeringVerified email at gec.io
- Esther PalomarUniversity of AlcalaVerified email at uah.es
Follow
Jorge Blasco Alís
Associate Professor, Universidad Politécnica de Madrid
Verified email at upm.es - Homepage