Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Elisavet KonstantinouAssistant Professor, Dep. of Information & Communication Systems Engineering, Univ. of the AegeanVerified email at aegean.gr
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
- Hao ChengUniversity of LuxembourgVerified email at uni.lu
- Marios AnagnostopoulosAssistant Professor, Aalborg UniversityVerified email at es.aau.dk
- Chloe MartindaleSenior Lecturer, University of BristolVerified email at tue.nl
- Peter Browne RønneResearcherVerified email at nbi.dk
- Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
- Anastasia DoumaDepartment of Information & Communication Systems Engineering, University of the AegeanVerified email at aegean.gr
- Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
- Mónica P. ArenasUniverity of LuxembourgVerified email at uni.lu
- Muhammed Ali BingolSenior Lecturer in Cyber Security at De Montfort UniversityVerified email at dmu.ac.uk
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
- Hüseyin DemirciUniversity of LuxembourgVerified email at uni.lu