Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Konstantinos MarkantonakisProfessor of Information SecurityVerified email at rhul.ac.uk
- Raja Naeem AkramDepartment of Computer Science, University of AberdeenVerified email at abdn.ac.uk
- Keith MayesRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Carlton ShepherdNewcastle University, UKVerified email at ncl.ac.uk
- Eibe FrankProfessor, Department of Computer Science, University of WaikatoVerified email at cs.waikato.ac.nz
- Emmanuel ConchonAssistant professor, University of Limoges, XLIMVerified email at unilim.fr
- HAFIZAH MANSORInternational Islamic University MalaysiaVerified email at iium.edu.my
- Damien SauveronProfessor in Computer Science, University of LimogesVerified email at unilim.fr
- Robert P. LeeGMO GlobalSignVerified email at globalsign.com
- Lorenzo CavallaroUniversity College LondonVerified email at ucl.ac.uk
- Manos PanaousisProfessor of Cyber Security, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
- Danushka JayasingheRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
- Assad UmarPhD candidate at Royal Holloway, University of LondonVerified email at live.rhul.ac.uk
- Gerhard HanckeProfessor, City University of Hong Kong, IEEE FellowVerified email at cityu.edu.hk