Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
Sofia Anna MenesidouSecure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.euStylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
Entso VeliouSolutions Architect and Researcher at UbitechVerified email at ubitech.eu
Neeli PrasadIEEE VTS Board of Governors MemberVerified email at smartavatar.nl
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Dunja MladenicSenior researcher at J. Stefan InstituteVerified email at ijs.si
Blaz FortunaNordoon; Jozef Stefan InstituteVerified email at blazfortuna.com
Dimosthenis KyriazisUniversity of PiraeusVerified email at unipi.gr
John SoldatosProfessor, Honorary Research Fellow, ICT and Business ConsultantVerified email at glasgow.ac.uk
Klemen KendaResearcher at Jozef Stefan Institute, LjubljanaVerified email at ijs.siPanagiotis GouvasDrVerified email at ubitech.eu
Emmanouil PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
Heini Bergsson DebesPhD Student, Technical University of Denmark (DTU)Verified email at dtu.dk
Hooman Tavakoli GhinaniSmartfactory, DFKIVerified email at dfki.de
Dr. Kaitai LiangCybersecurity engineering, UTU & TU DelftVerified email at utu.fi
Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistVerified email at dtu.dk
Nikolaos PitropakisAssociate Professor of Cyber Security at The American College of GreeceVerified email at acg.edu
Eleftherios AnastasiadisImperial College LondonVerified email at imperial.ac.uk