Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
Maryam MehrnezhadReader, Information Security Department, Royal Holloway University of London, UKVerified email at rhul.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk
Christopher BattarbeeSorbonne UniversityVerified email at york.ac.uk
Philokypros P. IoulianouVerified email at york.ac.uk
SAMIRAN BAGUniversity of WarwickVerified email at warwick.ac.uk
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Helen PetrieProfessor Emerita of Human Computer InteractionVerified email at york.ac.uk
Malte MöserChainalysisVerified email at maltemoeser.de
Mario StreflerKarlsruhe Institute of TechnologyVerified email at kit.edu
Shaoquan JiangUniversity of WindsorVerified email at uwindsor.ca
M. Jason HinekInstructor, School of Computer of Science, Carleton UniversityVerified email at scs.carleton.ca
Ludovic PerretEPITA/LREVerified email at epita.fr
Dr. Poonam YadavA/ Professor & Senior Lecturer at Uni of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Philip O. OgunbonaProfessor of Computer Science, University of WollongongVerified email at uow.edu.au