Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Helge JanickeCyber Security Cooperative Research CentreVerified email at cybersecuritycrc.org.au
Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
Leandros MaglarasProfessor of Cybersecurity, De Montfort UniversityVerified email at dmu.ac.uk
Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
Dr Cherdantseva YuliaCardiff UniversityVerified email at cardiff.ac.uk
David HutchisonProfessor of Computing, Lancaster UniversityVerified email at lancaster.ac.uk
Antonio CauSenior Research Fellow, De Montfort UniversityVerified email at dmu.ac.uk
Francois SieweDe Montfort UniversityVerified email at dmu.ac.uk
Viktoriya DegelerUniversity of GroningenVerified email at rug.nl
Panos LouvierisProfessor of Information Systems, Brunel University LondonVerified email at brunel.ac.uk
Natalie ClewleyBrunel UniversityVerified email at brunel.ac.uk
Stephan Reiff-MarganiecProfessor in Computer Science and Head of School of Computing and Engineering, University of DerbyVerified email at derby.ac.uk
Mark HallHonorary Research Associate, University of Waikato, New ZealandVerified email at cs.waikato.ac.nz