Get my own profile
Co-authors
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityVerified email at cl.cam.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Piotr ZielinskiGoogleVerified email at google.com
Ehsan ToreiniSchool of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Patrick McCorryResearch Associate at University College LondonVerified email at ncl.ac.uk
Maryam MehrnezhadSchool of Computing, Newcastle University, UKVerified email at newcastle.ac.uk
Xun YiProfessor of Cyber Security, RMIT UniversityVerified email at rmit.edu.au
Elisa BertinoProfessor of Computer Science, Director of Cyber Center, Purdue UniversityVerified email at cs.purdue.edu
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Syed Taha AliNational University of Science and TechnologyVerified email at seecs.edu.pk
Matthew ForshawLecturer in Data Science, School of Computing, Newcastle University, UKVerified email at ncl.ac.uk
Ben SmythVerified IO LimitedVerified email at bensmyth.com
Aad van MoorselProfessor of Computer Science, Newcastle University, UKVerified email at ncl.ac.uk
Avelino Francisco ZorzoProfessor of Computer Science, PUCRS - Pontifical Catholic University of RSVerified email at pucrs.br
Joseph K. LiuMonash UniversityVerified email at monash.edu
Budi AriefUniversity of KentVerified email at kent.ac.uk
Martin EmmsNewcastle UniversityVerified email at newcastle.ac.uk