Get my own profile
Public access
View all23 articles
12 articles
available
not available
Based on funding mandates
Co-authors
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Paul SmartSenior Research Fellow, University of SouthamptonVerified email at ecs.soton.ac.uk
Daniel HarborneCrime and Security Research Institute, Cardiff UniversityVerified email at cardiff.ac.uk
David MottVerified email at soton.ac.uk
Federico CeruttiUniversity of BresciaVerified email at unibs.it
Nigel ShadboltProfessor of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
Richard John TomsettAmazonVerified email at amazon.co.uk
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Jie BaoMemectVerified email at memect.co
Tien PhamMITRE LabsVerified email at mitre.org
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Moustafa F. AlzantotGoogle ResearchVerified email at google.com
Will WebberleySchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
Dong HuynhKing's College LondonVerified email at kcl.ac.uk
Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com
Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov