Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Thomas M. ChenProfessor in Cyber Security, City, University of LondonVerified email at city.ac.uk
Juan TapiadorUniversidad Carlos III de MadridVerified email at inf.uc3m.es
Guillermo Suarez-TangilAssistant Professor, IMDEA Networks InstituteVerified email at imdea.org
Pedro Peris-LopezProfessor, Computer Science Department, Carlos III University of MadridVerified email at inf.uc3m.es
Agustín OrfilaAssociate Professor of Computer Science, Universidad Carlos III de MadridVerified email at inf.uc3m.es
Jose Maria de FuentesAssociate Professor, Universidad Carlos III de Madrid (Spain)Verified email at inf.uc3m.es
Sergio PastranaAssociate ProfessorVerified email at inf.uc3m.es
Julio Hernandez-CastroProfessor of Computer Security, University of KentVerified email at kent.ac.uk
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Markus RoggenbachProfessor of Computer Science, Swansea UniversityVerified email at swan.ac.uk
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
Harsha KalutarageSchool of Computing, Robert Gordon University, Aberdeen, UKVerified email at rgu.ac.uk
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
Hugo GascónWIITVerified email at wiit.cloud
Esther PalomarUniversity of AlcalaVerified email at uah.es
Follow
Jorge Blasco Alís
Associate Professor, Universidad Politécnica de Madrid
Verified email at upm.es - Homepage