Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Vasilios MavroudisPrincipal Research Scientist, Alan Turing InstituteVerified email at cs.ucl.ac.uk
Jon CrowcroftUniversity of CambridgeVerified email at cl.cam.ac.uk
David ButlerPostdoc at the Alan Turing InstituteVerified email at turing.ac.uk
James BellResearch Associate, Turing InstituteVerified email at posteo.net
Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Myles FoleyDoctoral Researcher, Imperial College LondonVerified email at imperial.ac.uk
Kate HighnamPhD Student, Imperial College LondonVerified email at imperial.ac.uk
Eric VerheulPart-time Professor Financial Information Security, Radboud University NijmegenVerified email at cs.ru.nl
David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
Stephen PasterisResearch Associate, University College LondonVerified email at cs.ucl.ac.uk
Tim WatsonProfessor of Cyber Security, Loughborough UniversityVerified email at lboro.ac.uk
Thomas DaviesThe Alan Turing InstituteVerified email at turing.ac.uk