Get my own profile
Public access
View all13 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Stelios SotiriadisBirkbeck, University of LondonVerified email at dcs.bbk.ac.uk
Marcello TrovatiEdge Hill UniversityVerified email at edgehill.ac.uk
S. ToralUniversidad de SevillaVerified email at us.es
Federico BarreroElectronic Engineering Department, Universidad de Sevilla (University of Seville), SpainVerified email at us.es
Daniel Gutiérrez ReinaUniversidad de SevillaVerified email at us.es
Leonard BarolliProfessor, Fukuoka Institute of TechnologyVerified email at fit.ac.jp
Valentin CristeaUniversity Politehnica of BucharestVerified email at cs.pub.ro
Ciprian DobreUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Florin V. PopUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Zhihua LaiMicrosoft ResearchVerified email at microsoft.com
Timothy FrenchTeaching Fellow Cyber Bath UniversityVerified email at bath.ac.uk
Rajkumar BuyyaRedmond Barry Distinguished Professor, University of Melbourne; Fellow of IEEE & Academia EuropaeaVerified email at unimelb.edu.au
Yong YueXi'an Jiaotong-liverpool UniversityVerified email at xjtlu.edu.cn
Navonil MustafeeProfessor, University of Exeter Business School, University of ExeterVerified email at exeter.ac.uk
Asta ZelenkauskaiteAssociate Professor of Communication, Drexel UniversityVerified email at drexel.edu
Professor Kevin CurranProfessor in Cyber Security at Ulster UniversityVerified email at ulster.ac.uk
Evangelos PournarasUKRI Future Leaders Fellow, Associate Professor, School of Computing, University of LeedsVerified email at leeds.ac.uk
Dirk HelbingComputational Social Science, ETH ZurichVerified email at ethz.ch
Dr Eleana AsimakopoulouVisiting Researcher, University of Derby, UK
Follow
Nik Bessis
Professor and Head (Chair) of Department of Computer Science, Edge Hill University, UK
Verified email at edgehill.ac.uk - Homepage