Get my own profile
Public access
View all14 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Stelios SotiriadisBirkbeck, University of LondonVerified email at dcs.bbk.ac.uk
S. ToralUniversidad de SevillaVerified email at us.es
Federico BarreroElectronic Engineering Department, Universidad de Sevilla (University of Seville), SpainVerified email at us.es
Daniel Gutiérrez ReinaUniversidad de SevillaVerified email at us.es
Marcello TrovatiEdge Hill UniversityVerified email at edgehill.ac.uk
Leonard BarolliProfessor, Fukuoka Institute of TechnologyVerified email at fit.ac.jp
Ciprian DobreUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Valentin CristeaUniversity Politehnica of BucharestVerified email at cs.pub.ro
Florin V. PopUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Zhihua LaiMicrosoft ResearchVerified email at microsoft.com
Timothy FrenchTeaching Fellow Cyber Bath UniversityVerified email at bath.ac.uk
Rajkumar BuyyaCLOUDS Lab, School of Computing and Information Systems, The University of Melbourne, AustraliaVerified email at unimelb.edu.au
Yong YueXi'an Jiaotong-liverpool UniversityVerified email at xjtlu.edu.cn
Navonil MustafeeProfessor, University of Exeter Business School, University of ExeterVerified email at exeter.ac.uk
Asta ZelenkauskaiteAssociate Professor of Communication, Drexel UniversityVerified email at drexel.edu
Professor Kevin CurranProfessor in Cyber Security at Ulster UniversityVerified email at ulster.ac.uk
Evangelos PournarasAssociate Professor, School of Computing, University of LeedsVerified email at leeds.ac.uk
Dirk HelbingComputational Social Science, ETH ZurichVerified email at ethz.ch
Dr Eleana AsimakopoulouVisiting Researcher, University of Derby, UK
Follow
Nik Bessis
Professor and Head (Chair) of Department of Computer Science, Edge Hill University, UK
Verified email at edgehill.ac.uk - Homepage