Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter PopovReader, City University LondonVerified email at csr.city.ac.uk
Ilir GashiReader, Centre for Software Reliability, City University LondonVerified email at city.ac.uk
Robin E BloomfieldCity University and Adelard LLPVerified email at csr.city.ac.uk
Kizito SalakoCity, University of LondonVerified email at city.ac.uk
Olivier ThonnardDirector Security Operations, AmadeusVerified email at amadeus.com
Alysson BessaniLASIGE, Dep. de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at ciencias.ulisboa.pt
Corrado LeitaLastline Inc.Verified email at lastline.com
Michel CukierProfessor, University of MarylandVerified email at umd.edu
Paulo SousaLetsGetCheckedVerified email at letsgetchecked.com
Bertrand SobestoSenior IT Security Engineer, University of MarylandVerified email at umd.edu
Stephen James MasonPhD Research Student - City University LondonVerified email at city.ac.uk
Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at cs.fau.de
Johan KarlssonProfessor of dependable realtime systemsVerified email at chalmers.se
Marco VieiraUniversity of North Carolina at Charlotte, University of CoimbraVerified email at uncc.edu
Henrique MadeiraUniversity of CoimbraVerified email at dei.uc.pt
Urko Zurutuza OrtegaMondragon Unibertsitatea - Data Analysis & Cybersecurity (ROR 00wvqgd19)Verified email at mondragon.edu
Katinka WolterProfessor of Computer Science, FU BerlinVerified email at fu-berlin.de
Robin BerthierUniversity of IllinoisVerified email at illinois.edu