Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Richard PayneSenior Software Engineer, Asset55Verified email at assetfiftyfive.com
Maciej KoutnyNewcastle UniversityVerified email at ncl.ac.uk
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Howard BowmanSchool of Computing, University of Kent and School of Psychology, University of BirminghamVerified email at kent.ac.uk
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Paolo MissierProfessor of Big Data Engineering and AnalyticsVerified email at acm.org
Vasa CurcinProfessor of health informatics, King's College LondonVerified email at doc.ic.ac.uk
Hoang Nga NguyenAssociate Professor, Swansea UniversityVerified email at swansea.ac.uk
Cliff B JonesProfessor of Computing Science, Newcastle University, UKVerified email at ncl.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
Jim DaviesUniversity of OxfordVerified email at cs.ox.ac.uk
Andreas RothSAP SEVerified email at sap.com
Alexander RomanovskySenior Research Investigator and Emeritus Professor, Newcastle University, UKVerified email at ncl.ac.uk
Augusto Cesar Alves SampaioUFPE - Universidade Federal de PernambucoVerified email at cin.ufpe.br
Carron ShanklandProfessor of Computing Science, University of StirlingVerified email at cs.stir.ac.uk
Alvaro MiyazawaResearch Associate, University of YorkVerified email at york.ac.uk
Finn Overgaard HansenIngeniørdocent, Aarhus University, School of EngineeringVerified email at iha.dk