Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Julio Hernandez-CastroProfessor of Computer Security, University of KentVerified email at kent.ac.uk
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Cristina GacekAssociate Dean for Education, City University LondonVerified email at city.ac.uk
Martin EmmsNewcastle UniversityVerified email at newcastle.ac.uk
Neil SpeirsSenior Lecturer in Computing Science, Newcastle University, UKVerified email at ncl.ac.uk
Denis BesnardIcsiVerified email at icsi-eu.org
Orcun CetinSabancı University, University of KentVerified email at sabanciuniv.edu
Calvin BrierleyUniversity of KentVerified email at kent.ac.uk
Alexander RomanovskySenior Research Investigator and Emeritus Professor, Newcastle University, UKVerified email at ncl.ac.uk
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
David J. BarnesSenior Lecturer in Computer Science, University of KentVerified email at kent.ac.uk
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
A.S.McGoughNewcastle UniversityVerified email at newcastle.ac.uk
David S. WallUniversity of LeedsVerified email at leeds.ac.uk
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Dr. Poonam YadavA/ Professor & Senior Lecturer at Uni of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk