Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
Xavier BellekensLupovis.ioVerified email at lupovis.io
Jason R.C. NurseAssociate Professor in Cyber Security, University of KentVerified email at kent.ac.uk
Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk
Harjinder Singh LallieUniversity Reader (Cyber Security), University of WarwickVerified email at warwick.ac.uk
Dr Gregory EpiphaniouAssociate Professor in Security Engineering, University of WarwickVerified email at warwick.ac.uk
Ben CollierLecturer in Digital Methods, University of EdinburghVerified email at cl.cam.ac.uk
Shane HorganEdinburgh Napier UniveristyVerified email at napier.ac.uk
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
Richard JonesSenior Lecturer in Criminology, University of EdinburghVerified email at ed.ac.uk
Tolga ÜnlüAbertay UniversityVerified email at uad.ac.uk
Graham I. JohnsonAbertay UniversityVerified email at ncr.com
Cedric HebertSAP Security ResearchVerified email at sap.com
Merve SahinSAP Security ResearchVerified email at eurecom.fr
Martina ZiefleRWTH Aachen UniversityVerified email at comm.rwth-aachen.de
Philipp BraunerPostdoc, RWTH Aachen UniversityVerified email at rwth-aachen.de
Marc KyddAbertay UniversityVerified email at uad.ac.uk
Jamie O'HareAbertay UniversityVerified email at abertay.ac.uk