Get my own profile
Public access
View all7 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Yacine OuzroutDISP Laboratory - Université Lumière Lyon 2Verified email at univ-lyon2.fr
Sebti Foufou, PhDProf. of Computer Science, University of Sharjah, UAEVerified email at sharjah.ac.ae
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Abdelhak BelhiCSE, College of Engineering, Doha, QatarVerified email at qu.edu.qa
haiqing zhangChengdu University of Information TechnologyVerified email at cuit.edu.cn
Houssem GasmiUniversity of QatarVerified email at univ-lyon2.fr
Ridha DerrouicheProfessor of Supply Chain, EM Strasbourg Business School, Strasbourg UniversityVerified email at em-strasbourg.eu
Dimitris KiritsisEPFLVerified email at epfl.ch
Pradorn SUREEPHONGCollege of Arts, Media and Technology, Chiang Mai UniversityVerified email at camt.info
Chantal Cherifi BonnerComputer Science, Associate Professor, DISP Lab. University of Lyon2, FRANCEVerified email at univ-lyon2.fr
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Sergio TerziPolitecnico di MilanoVerified email at polimi.it
Sudarsan RachuriAdvanced Manufacturing Office, EERE,DOEVerified email at hq.doe.gov
Eswaran SubrahmanianCarnegie Mellon UniversityVerified email at cmu.edu
Nickolas S. SapidisDepartment of Mechanical Engineering, University of Western MacedoniaVerified email at uowm.gr