Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Markus RoggenbachProfessor of Computer Science, Swansea UniversityVerified email at swan.ac.uk
Natasha AlechinaDepartment of Information and Computing Sciences, University of UtrechtVerified email at uu.nl
Brian LoganNottingham UniversityVerified email at cs.nott.ac.uk
Abdur RakibCoventry UniversityVerified email at coventry.ac.uk
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
Helen TreharneProfessor, Department of Computer Science, University of SurreyVerified email at surrey.ac.uk
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Franco RaimondiProfessor of Computer Science, Middlesex UniversityVerified email at mdx.ac.uk
Jeremy BryansResearch Fellow, Coventry University, UKVerified email at coventry.ac.uk
Nils BullingTU ClausthalVerified email at in.tu-clausthal.de
Tran Dinh KhangHanoi University of Science and TechnologyVerified email at soict.hust.edu.vn
Jorge Blasco AlísSenior Lecturer, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Anne E. HaxthausenAssociate Professor of Computer Science, Technical University of DenmarkVerified email at dtu.dk
Matthew TrumbleUniversity of SurreyVerified email at surrey.ac.uk
Leonardo MostardaAssociate ProfessorVerified email at unicam.it
Follow