Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Xavier BellekensLupovis.ioVerified email at lupovis.io
Ben CollierLecturer in Digital Methods, University of EdinburghVerified email at cl.cam.ac.uk
Shane HorganEdinburgh Napier UniveristyVerified email at napier.ac.uk
Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk
Jason R.C. NurseAssociate Professor in Cyber Security, University of KentVerified email at kent.ac.uk
Harjinder Singh LallieAssociate Professor, Cyber Security, University of WarwickVerified email at warwick.ac.uk
Richard JonesSenior Lecturer in Criminology, University of EdinburghVerified email at ed.ac.uk
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
Tolga ÜnlüAbertay UniversityVerified email at uad.ac.uk
Jamie O'HareAbertay UniversityVerified email at abertay.ac.uk
Cedric HebertSAP Security ResearchVerified email at sap.com
Merve SahinSAP Security ResearchVerified email at eurecom.fr