Get my own profile
Public access
View all8 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Cristina GacekAssociate Dean for Education, City University LondonVerified email at city.ac.uk
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Julio Hernandez-CastroProfessor of Computer Security, University of KentVerified email at kent.ac.uk
Martin EmmsNewcastle UniversityVerified email at newcastle.ac.uk
Neil SpeirsSenior Lecturer in Computing Science, Newcastle University, UKVerified email at ncl.ac.uk
Denis BesnardIcsiVerified email at icsi-eu.org
Alexander RomanovskySenior Research Investigator and Emeritus Professor, Newcastle University, UKVerified email at ncl.ac.uk
Calvin BrierleyUniversity of KentVerified email at kent.ac.uk
Orcun CetinSabancı University, University of KentVerified email at sabanciuniv.edu
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
David J. BarnesSenior Lecturer in Computer Science, University of KentVerified email at kent.ac.uk
A.S.McGoughNewcastle UniversityVerified email at newcastle.ac.uk
David S. WallUniversity of LeedsVerified email at leeds.ac.uk
Jason R.C. NurseAssociate Professor in Cyber Security, University of KentVerified email at kent.ac.uk
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Dr. Poonam YadavAssitant professor and Lecturer at University of York and Visiting Researcher at University ofVerified email at york.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk