Get my own profile
Public access
View all29 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- David CamachoUniversidad Politécnica de MadridVerified email at upm.es
- Javier Huertas-TatoUniversidad Politécnica de MadridVerified email at upm.es
- Héctor D. MenéndezKing's College LondonVerified email at kcl.ac.uk
- Raul Lara-CabreraUniversidad Politécnica de MadridVerified email at upm.es
- Juan TapiadorUniversidad Carlos III de MadridVerified email at inf.uc3m.es
- Félix Fuentes-HurtadoUniversidad Politécnica de Madrid (UPM)Verified email at upm.es
- Valery NaranjoUniversidad Politécncia de ValenciaVerified email at labhuman.i3bh.es
- Victor Rodriguez-FernandezUniversidad Politécnica de MadridVerified email at upm.es
- David ClarkComputer Science, University College LondonVerified email at ucl.ac.uk
- Víctor Manuel VargasSubstitute Lecturer in University of CórdobaVerified email at uco.es
- Pedro Antonio GutiérrezFull Professor of Computer Science, University of Córdoba (Spain)Verified email at uco.es
- José Carlos Pulido PascualPh.D. in Computer Science and TechnologyVerified email at inf.uc3m.es
- Angel García OlayaUniversidad Carlos III de MadridVerified email at inf.uc3m.es
- José Carlos González DoradoPh. D. Universidad Carlos III de Madrid, InrobicsVerified email at alumnos.uc3m.es
- Julian FIERREZFull Professor, Universidad Autonoma de MadridVerified email at uam.es
- Julio Hernandez-CastroProfessor of Computer Security, University of KentVerified email at kent.ac.uk
- Fernando FernándezCatedrático Universidad Carlos III de Madrid (UC3M)Verified email at inf.uc3m.es
Follow