Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Andreas JacobssonAssociate Professor in Computer Science @ Malmö UniversityVerified email at mah.se
- Paul DavidssonProfessor of Computer Science, Malmö University, SwedenVerified email at mau.se
- Bahtijar VogelAssociate Professor, Computer Science, Malmö UniversityVerified email at mau.se
- Victor R. KebandeAsst Professor of Cyber & IT Security, Blekinge Institute of Technology, SwedenVerified email at bth.se
- Jan A. PerssonMalmö HögskolaVerified email at mau.se
- SADI ALAWADIAssociated Professor of Machine Learning at Blekinge Tekniska Högskola (BTH), SwedenVerified email at bth.se
- Carl Magnus OlssonAssociate Professor of Computer Science, Malmö UniversityVerified email at mau.se
- Miranda KajtaziDepartment of Informatics, Lund UniversityVerified email at ics.lu.se
- Yuji DongXi'an Jiaotong Liverpool UniversityVerified email at xjtlu.edu.cn
- Romina SpalazzeseAssoc. Prof. in Computer Science at Malmö UniversityVerified email at mau.se
- Johan HolmbergMalmö UniversityVerified email at mau.se
- Agnes TegenResearcher at FOIVerified email at foi.se
- Arezoo Sarkheyli-hägeleAssistant Professor at Malmö UniversityVerified email at mau.se