Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
Natasha AlechinaDepartment of Information and Computing Sciences, University of UtrechtVerified email at uu.nl
Brian LoganNottingham UniversityVerified email at cs.nott.ac.uk
Markus RoggenbachProfessor of Computer Science, Swansea UniversityVerified email at swan.ac.uk
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
Abdur RakibCoventry UniversityVerified email at coventry.ac.uk
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Franco RaimondiProfessor of Computer Science, Middlesex UniversityVerified email at mdx.ac.uk
Jeremy BryansResearch Fellow, Coventry University, UKVerified email at coventry.ac.uk
Nils BullingTU ClausthalVerified email at in.tu-clausthal.de
Tran Dinh KhangHanoi University of Science and TechnologyVerified email at soict.hust.edu.vn
Jorge Blasco AlísAssociate Professor, Universidad Politécnica de MadridVerified email at upm.es
Anne E. HaxthausenAssociate Professor of Computer Science, Technical University of DenmarkVerified email at dtu.dk
Matthew TrumbleUniversity of SurreyVerified email at surrey.ac.uk
Leonardo MostardaAssociate ProfessorVerified email at unicam.it