Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Julio Hernandez-CastroProfessor of Computer Security, University of KentVerified email at kent.ac.uk
Cristina GacekAssociate Dean for Education, City University LondonVerified email at city.ac.ukAad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Martin EmmsNewcastle UniversityVerified email at newcastle.ac.uk
Neil SpeirsSenior Lecturer in Computing Science, Newcastle University, UKVerified email at ncl.ac.ukOrcun CetinSabancı University, University of KentVerified email at sabanciuniv.edu
Denis BesnardIcsiVerified email at icsi-eu.org
Calvin BrierleyUniversity of KentVerified email at kent.ac.uk
Shujun Li (李树钧)Professor of Cyber Security, Institute of Cyber Security for Society (iCSS), University of KentVerified email at kent.ac.uk
Alexander RomanovskyEmeritus Professor, Newcastle University, UKVerified email at ncl.ac.uk
David J. BarnesSenior Lecturer in Computer Science, University of KentVerified email at kent.ac.uk
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
A.S.McGoughNewcastle UniversityVerified email at newcastle.ac.uk
David S. WallUniversity of LeedsVerified email at leeds.ac.uk
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Dr Poonam YadavAssociate Professor at Uni of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk