Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
- Konstantinos XynosVerified email at mycenx.com
- Theo TryfonasProfessor of Infrastructure Systems and Urban Innovation, University of BristolVerified email at bristol.ac.uk
- Craig ValliSafeNSecureCyberVerified email at safensecurecyber.com
- Richard J. WhiteLecturer in Computer Science, Cardiff University (retired)Verified email at rjwhite.tk
- Suzanne EmburyReader in Software Engineering, Dept of Computer Science, The University of ManchesterVerified email at cs.manchester.ac.uk
- Glenn S. DardickProfessor of CybersecurityVerified email at dardick.net
- Mikhaila BurgessNortheastern University - LondonVerified email at nulondon.ac.uk
- Alastair IronsDeputy Vice Chancellor and Professor of Computer Science, Abertay UniversityVerified email at abertay.ac.uk
- Daniel CunliffeReader, University of South WalesVerified email at southwales.ac.uk
- Theodoros SpyridopoulosCardiff UniversityVerified email at cardiff.ac.uk
- Morten GoodwinProfessor, Centre for Artificial Intelligence Research, University of AgderVerified email at uia.no
- Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
- George OikonomouAssociate Professor or IoT Networking, University of BristolVerified email at bristol.ac.uk
- Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
- Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
- Stilianos VidalisDeputy Head of Department, University of HertfordshireVerified email at herts.ac.uk
- Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se
- Elizabeth ThomasINSERMU1093 Université de BourgogneVerified email at u-bourgogne.fr