Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Cristina GacekAssociate Dean for Education, City University LondonVerified email at city.ac.uk
Julio Hernandez-CastroProfessor of Computer Security, University of KentVerified email at kent.ac.uk
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Martin EmmsNewcastle UniversityVerified email at newcastle.ac.uk
Neil SpeirsSenior Lecturer in Computing Science, Newcastle University, UKVerified email at ncl.ac.uk
Denis BesnardIcsiVerified email at icsi-eu.org
Alexander RomanovskySenior Research Investigator and Emeritus Professor, Newcastle University, UKVerified email at ncl.ac.uk
Calvin BrierleyUniversity of KentVerified email at kent.ac.uk
Orcun CetinSabancı University, University of KentVerified email at sabanciuniv.edu
David J. BarnesSenior Lecturer in Computer Science, University of KentVerified email at kent.ac.uk
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
Jason R.C. NurseAssociate Professor in Cyber Security, University of KentVerified email at kent.ac.uk
A.S.McGoughNewcastle UniversityVerified email at newcastle.ac.uk
David S. WallUniversity of LeedsVerified email at leeds.ac.uk
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Dr. Poonam YadavA/ Professor and Lecturer at University of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk