Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Jose SuchProfessor of Computer Science, King's College London & VRAIN-UPVVerified email at kcl.ac.uk
- Awais RashidProfessor, Department of Computer Science, University of Bristol, UKVerified email at bristol.ac.uk
- Antonios GouglidisAssociate Professor, Lancaster UniversityVerified email at lancaster.ac.uk
- William KnowlesLancaster UniversityVerified email at williamknowles.io
- Nicholas MicallefLecturer in Computer Science, Swansea UniversityVerified email at swansea.ac.uk
- Hamed BalogunUniversity of Central LancashireVerified email at uclan.ac.uk
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
- Shlomo BerkovskyMacquarie UniversityVerified email at mq.edu.au
- Erwin AdiDeloitte Risk Advisory Pty LtdVerified email at deloitte.com.au
- Kopo M. RamokapaneUniversity of BristolVerified email at bristol.ac.uk
- Sören PreibuschMeta ← Google ← Microsoft Research ← University of CambridgeVerified email at fb.com
- Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
- Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
- Matteo MigliavaccaUniversity of KentVerified email at kent.ac.uk
- Fernando OteroReader, University of KentVerified email at kent.ac.uk
- Jose M. del AlamoAssociate Professor (UPM)Verified email at upm.es
- Borja BalleDeepMindVerified email at google.com
- Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu