Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Ehsan ToreiniDepartment of Computer Science, University of SurreyVerified email at surrey.ac.uk
Maryam MehrnezhadAssociate Professor, Information Security Department, Royal Holloway University of London, UKVerified email at rhul.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk
Christopher BattarbeeUniversity of YorkVerified email at york.ac.uk
Philokypros P. IoulianouVerified email at york.ac.uk
SAMIRAN BAGUniversity of WarwickVerified email at warwick.ac.uk
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkVerified email at york.ac.uk
Mario StreflerKarlsruhe Institute of TechnologyVerified email at kit.edu
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Malte MöserChainalysisVerified email at maltemoeser.de
Shaoquan JiangUniversity of WindsorVerified email at uwindsor.ca
M. Jason HinekInstructor, School of Computer of Science, Carleton UniversityVerified email at scs.carleton.ca
Dr. Poonam YadavA/ Professor and Lecturer at University of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
Ludovic PerretSorbonne University/LIP6Verified email at lip6.fr
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Philip O. OgunbonaProfessor of Computer Science, University of WollongongVerified email at uow.edu.au
Helen PetrieProfessor of Human Computer InteractionVerified email at york.ac.uk