Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Jose SuchProfessor of Computer Science, King's College London & VRAIN-UPVVerified email at kcl.ac.uk
Awais RashidProfessor, Department of Computer Science, University of Bristol, UKVerified email at bristol.ac.uk
Antonios GouglidisAssociate Professor, Lancaster UniversityVerified email at lancaster.ac.uk
William KnowlesLancaster UniversityVerified email at williamknowles.io
Nicholas MicallefLecturer in Computer Science, Swansea UniversityVerified email at swansea.ac.uk
Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
Hamed BalogunUniversity of Central LancashireVerified email at uclan.ac.uk
Shlomo BerkovskyMacquarie UniversityVerified email at mq.edu.au
Erwin AdiDeloitte Technology and TransformationVerified email at deloitte.com.au
Kopo M. RamokapaneUniversity of BristolVerified email at bristol.ac.uk
Sören PreibuschMeta ← Google ← Microsoft Research ← University of CambridgeVerified email at fb.com
Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
Matteo MigliavaccaUniversity of KentVerified email at kent.ac.uk
Fernando OteroReader, University of KentVerified email at kent.ac.uk
Jose M. del AlamoAssociate Professor (UPM)Verified email at upm.es
Borja BalleDeepMindVerified email at google.com
Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu