Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Theo DimitrakosProfessorial Fellow, University of KentVerified email at ifiptm.org
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Nektarios GeorgalasBT Intel Co-lab Director, British TelecomVerified email at bt.com
Ali SajjadBT Applied ResearchVerified email at bt.com
Joshua DanielOnyx, JPMorgan Chase & Co.Verified email at bt.com
David W ChadwickEmeritus Professor, University of Kent. Product Director, Crossword Cybersecurity PLCVerified email at kent.ac.uk
Srinath SrinivasaIIIT BangaloreVerified email at iiitb.ac.in
Srinivas GuntupalliSoftware Engineer, McAfeeVerified email at mcafee.com
Subramanian NeelakantanSenior Director (R&D), C-DACVerified email at cdac.in
Satyanarayana NCentre for Development of Advanced Computing, HyderabadVerified email at cdac.in
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
George SpanoudakisProfessor, City University LondonVerified email at city.ac.uk
Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
Yoga RahulamathavanLoughborough University London, UKVerified email at lboro.ac.uk
Mariam KiranLawrence Berkeley National LaboratoryVerified email at es.net
Jordi GuitartUniversitat Politècnica de Catalunya (UPC); Barcelona Supercomputing Center (BSC)Verified email at ac.upc.edu
Jorge Ejarque ArtigasResearcher at Workflows and Distributed Computing Group, Barcelona Supercomputing CenterVerified email at bsc.es
Petter SvärdUmeå UniversityVerified email at cs.umu.se
Daniel EsplingPhD, Computing Science, Umeå UniversityVerified email at cs.umu.se
Johan TordssonElastisys and Umeå University (computing science)Verified email at cs.umu.se