Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
- Markus RoggenbachProfessor of Computer Science, Swansea UniversityVerified email at swan.ac.uk
- Natasha AlechinaDepartment of Information and Computing Sciences, University of UtrechtVerified email at uu.nl
- Brian LoganNottingham UniversityVerified email at cs.nott.ac.uk
- Abdur RakibCoventry UniversityVerified email at coventry.ac.uk
- Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
- Jeremy BryansResearch Fellow, Coventry University, UKVerified email at coventry.ac.uk
- Franco RaimondiProfessor of Computer Science, Gran Sasso Science InstituteVerified email at gssi.it
- Harsha KalutarageSchool of Computing, Robert Gordon University, Aberdeen, UKVerified email at rgu.ac.uk
- Nils BullingTU ClausthalVerified email at in.tu-clausthal.de
- Tran Dinh KhangHanoi University of Science and TechnologyVerified email at soict.hust.edu.vn
- Jorge Blasco AlísAssociate Professor, Universidad Politécnica de MadridVerified email at upm.es
- Matthew TrumbleUniversity of SurreyVerified email at surrey.ac.uk
- Anne E. HaxthausenAssociate Professor of Computer Science, Technical University of DenmarkVerified email at dtu.dk
- Leonardo MostardaAssociate professor, university of PerugiaVerified email at unipg.it