Get my own profile
Public access
View all15 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
- Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
- Stylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
- Dimitrios PapamartzivanosDigital Security & Trusted Computing Group at UBITECH LtdVerified email at aegean.gr
- Sofia Anna MenesidouDigital Security & Trusted Computing Group at UBITECH LtdVerified email at ubitech.eu
- Neeli PrasadIEEE VTS Board of Governors MemberVerified email at smartavatar.nl
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Entso VeliouSecurity Engineer and Researcher at UbitechVerified email at ubitech.eu
- Panagiotis GouvasDrVerified email at ubitech.eu
- Manos PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
- Dimosthenis KyriazisUniversity of PiraeusVerified email at unipi.gr
- Dunja MladenicSenior researcher at J. Stefan InstituteVerified email at ijs.si
- Blaz FortunaExtrakt.AI; Jozef Stefan InstituteVerified email at blazfortuna.com
- Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
- Heini Bergsson DebesPhD Student, Technical University of Denmark (DTU)Verified email at dtu.dk
- John SoldatosProfessor, Honorary Research Fellow, ICT and Business ConsultantVerified email at glasgow.ac.uk
- Klemen KendaResearcher at Jozef Stefan Institute, LjubljanaVerified email at ijs.si
- Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk
- Eleftherios AnastasiadisImperial College LondonVerified email at imperial.ac.uk
- George LoukasHead, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at gre.ac.uk