Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Theo DimitrakosProfessorial Fellow, University of KentVerified email at ifiptm.org
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Nektarios GeorgalasBT Intel Co-lab Director, British TelecomVerified email at bt.com
Ali SajjadBT Applied ResearchVerified email at bt.com
Joshua DanielOnyx, JPMorgan Chase & Co.Verified email at bt.com
David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdVerified email at kent.ac.uk
Srinath SrinivasaIIIT BangaloreVerified email at iiitb.ac.in
Srinivas GuntupalliSoftware Engineer, NetskopeVerified email at netskope.com
Subramanian NeelakantanSenior Director (R&D), C-DACVerified email at cdac.in
Satyanarayana NCentre for Development of Advanced Computing, HyderabadVerified email at cdac.in
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
George SpanoudakisProfessor, City University LondonVerified email at city.ac.uk
Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
Yogachandran RAHULAMATHAVANReader in Cybersecurity and Privacy, Loughborough University, UKVerified email at lboro.ac.uk
Mariam KiranOak Ridge National LaboratoryVerified email at ornl.gov
Jordi GuitartUniversitat Politècnica de Catalunya (UPC); Barcelona Supercomputing Center (BSC)Verified email at ac.upc.edu
Jorge Ejarque ArtigasResearcher at Workflows and Distributed Computing Group, Barcelona Supercomputing CenterVerified email at bsc.es
Petter SvärdUmeå UniversityVerified email at cs.umu.se
Daniel EsplingPhD, Computing Science, Umeå UniversityVerified email at cs.umu.se
Johan TordssonElastisys and Umeå University (computing science)Verified email at cs.umu.se