Get my own profile
Co-authors
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Maciej KoutnyNewcastle UniversityVerified email at ncl.ac.uk
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Howard BowmanSchool of Computing, University of Kent and School of Psychology, University of BirminghamVerified email at kent.ac.uk
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of Secure SystemsVerified email at surrey.ac.uk
Cliff B JonesProfessor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Paolo MissierReader in Large Scale Information Systems, Computing Science, Newcastle University, UKVerified email at acm.org
Vasa CurcinSenior lecturer in health informatics, King's College LondonVerified email at doc.ic.ac.uk
Andreas RothSAP SEVerified email at sap.com
Alexander RomanovskyProfessor, Newcastle University, UKVerified email at ncl.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
Jim DaviesUniversity of OxfordVerified email at cs.ox.ac.uk
Siraj Ahmed ShaikhCoventry UniversityVerified email at coventry.ac.uk
Augusto Cesar Alves SampaioUFPE - Universidade Federal de PernambucoVerified email at cin.ufpe.br
David GreatheadSenior Research Assistant, Northumbria UniversityVerified email at northumbria.ac.uk
Marcel OliveiraLecturer of Computer Science and Software Engineering, Universidade Federal do Rio Grande do NorteVerified email at dimap.ufrn.br
Pedro AntoninoDPhil Student at the University of OxfordVerified email at cs.ox.ac.uk
Carron ShanklandProfessor of Computing Science, University of StirlingVerified email at cs.stir.ac.uk
Bev LittlewoodProfessor, City University LondonVerified email at csr.city.ac.uk