Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
Dr Cherdantseva YuliaCardiff UniversityVerified email at cardiff.ac.uk
Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
David HutchisonEmeritus Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Antonio CauSenior Research Fellow, De Montfort UniversityVerified email at dmu.ac.uk
Francois SieweDe Montfort UniversityVerified email at dmu.ac.uk
Victoria DegelerUniversity of AmsterdamVerified email at uva.nl
Panos LouvierisProfessor of Information Systems, Brunel University LondonVerified email at brunel.ac.uk
Natalie ClewleyBrunel UniversityVerified email at brunel.ac.uk
Stephan Reiff-MarganiecProfessor in Computer Science and Head of School of Computing and Engineering, University of DerbyVerified email at derby.ac.uk
Mark HallHonorary Research Associate, University of Waikato, New ZealandVerified email at cs.waikato.ac.nz