Get my own profile
Public access
View all57 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Nicholas KolokotronisUniversity of the Peloponnese, Department of Informatics and TelecommunicationsVerified email at uop.gr
- Gueltoum BendiabUniversity of Frères MentouriVerified email at umc.edu.dz
- Bogdan GhitaUniversity of PlymouthVerified email at plymouth.ac.uk
- Konstantinos LimniotisHellenic Data Protection AuthorityVerified email at di.uoa.gr
- Besfort ShalaFrankfurt University of Applied SciencesVerified email at e-technik.org
- Ulrich TrickProf. Dr.-Ing., Frankfurt University of Applied SciencesVerified email at trick-online.de
- Emanuele BelliniUniversity of Roma Tre, Khalifa University Fellow, IEEE SMC TCHS, IEEE-CSRVerified email at ieee.org
- Basil PapadopoulosProfessor of Mathematics and Statistics,Democritus University of ThraceVerified email at civil.duth.gr
- Vasilis KatosBournemouth UniversityVerified email at bournemouth.ac.uk
- Muhammad AliAnglia Ruskin UniversityVerified email at aru.ac.uk
- Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
- Ievgeniia KuzminykhKing's College London, Department of InformaticsVerified email at nure.ua
- Stavros StavrouProfessor, Open University of CyprusVerified email at ouc.ac.cy
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
- Panagiotis SarigiannidisAssociate Professor, University of Western MacedoniaVerified email at uowm.gr