Get my own profile
Public access
View all34 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Xiaoshan LiAssociate Professor of Computer Science, University of MacauVerified email at umac.mo
Anders P. RavnAalborg UniversityVerified email at cs.aau.dk
Volker StolzHøgskulen på Vestlandet & Universitetet i OsloVerified email at foldr.org
Zhenbang ChenProfessor, College of Computer, National University of Defense Technology, Changsha, ChinaVerified email at nudt.edu.cn
Naijun ZhanInstitute of Software Chinese Academy of SciencesVerified email at ios.ac.cn
Quan LongUniversity of CalgaryVerified email at ucalgary.ca
Charles MorissetReader in Security, Newcastle UniversityVerified email at ncl.ac.uk
Wei KeMacao Polytechnic UniversityVerified email at mpu.edu.mo
Jonathan P. BowenEmeritus Professor of Computing, London South Bank UniversityVerified email at lsbu.ac.uk
Esther PalomarUniversity of AlcalaVerified email at uah.es
Nafees QamarBryant UniversityVerified email at bryant.edu
Peter T. BreuerIndependent ResearcherVerified email at hecusys.com
Jim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
Xia ZengSouthwest UniversityVerified email at swu.edu.cn
Taolue ChenSchool of Computing and Mathematical Sciences, Birkbeck, University of LondonVerified email at bbk.ac.uk
Zhengfeng YangEast China Normal UniversityVerified email at sei.ecnu.edu.cn
Martin SchaefAmazon Web ServicesVerified email at amazon.com
Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at tees.ac.uk
Cristiano BertoliniResearcher, Federal University of Santa MariaVerified email at cin.ufpe.br
Abdelhakim HannousseUniversité 8 Mai 1945, Guelma, AlgérieVerified email at univ-guelma.dz