Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Konstantinos XynosVerified email at mycenx.com
Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
Theo TryfonasUniversity of BristolVerified email at bristol.ac.uk
Craig ValliSafeNSecureCyberVerified email at safensecurecyber.com
Richard J. WhiteLecturer in Computer Science, Cardiff University (retired)Verified email at rjwhite.tk
Suzanne EmburyReader in Software Engineering, Dept of Computer Science, The University of ManchesterVerified email at cs.manchester.ac.uk
Glenn S. DardickProfessor of CybersecurityVerified email at dardick.net
Mikhaila BurgessEDGE Innovation Unit, New College of the HumanitiesVerified email at nchlondon.ac.uk
Alastair IronsDeputy Vice Chancellor and Professor of Computer Science, Abertay UniversityVerified email at abertay.ac.uk
Daniel CunliffeReader, University of South WalesVerified email at southwales.ac.uk
Morten GoodwinProfessor, Centre for Artificial Intelligence Research, University of AgderVerified email at uia.no
George OikonomouSenior Lecturer in IoT Networking, University of BristolVerified email at bristol.ac.uk
Panagiotis AndriotisUWE Bristol, National Institute of InformaticsVerified email at uwe.ac.uk
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
Stilianos VidalisPrincipal Lecturer, University of HertfordshireVerified email at herts.ac.uk
Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se