Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Falko DresslerTechnische Universität BerlinVerified email at ccs-labs.org
- Reinhard GermanVerified email at fau.de
- David EckhoffTUM CREATEVerified email at tum-create.edu.sg
- Eerke BoitenSchool of Computer Science and Informatics, De Montfort University, UKVerified email at dmu.ac.uk
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
- Ying HeThe University of NottinghamVerified email at nottingham.ac.uk
- Christoph SommerChair of Networked Systems Modeling, TU Dresden, GermanyVerified email at tu-dresden.de
- Yuchen ZhaoUniversity of YorkVerified email at york.ac.uk
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
- Ali H. Al-BayattiAssociate Professor, Cyber Technology Institute, De Montfort UniversityVerified email at dmu.ac.uk
- Thomas ReisingerSchool of Computer Science and Informatics, De Montfort University, UKVerified email at my365.dmu.ac.uk
- Iryna YevseyevaDe Montfort University, LeicesterVerified email at dmu.ac.uk
- Thomas Halva LabellaLuxoftVerified email at online.de
- Joseph Richard SnapeLecturer and Research Fellow, Institute of Energy and Sustainable Development, De MontfortVerified email at dmu.ac.uk
- Lee HadlingtonSenior Lecturer In Cyberpsychology, Nottingham Trent UniversityVerified email at ntu.ac.uk
- Aladdin AyeshProfessor of Artificial Intelligence, University of Aberdeen, UKVerified email at abdn.ac.uk
- Ulrich RüdeProfessor for Computational Science and Engineering, FAU Erlangen-NürnbergVerified email at fau.de
- Kai-Steffen HielscherAssitant Professor Computer Science, FAU ErlangenVerified email at fau.de