Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
Michael GoldsmithAssociate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department ofVerified email at cs.ox.ac.uk
Oliver BuckleyUniversity of East AngliaVerified email at uea.ac.uk
Jason R.C. NurseAssociate Professor in Cyber Security, University of KentVerified email at kent.ac.uk
David MarshallProfessor of Computer Vision, Cardiff UniversityVerified email at cs.cardiff.ac.uk
James E MorganCardiff UniversityVerified email at cardiff.ac.uk
Paul L. RosinSchool of Computer Science, Cardiff UniversityVerified email at cs.cf.ac.uk
Ioannis AgrafiotisComputer Science Department, University of OxfordVerified email at cs.ox.ac.uk
Monica WhittyProfessor of Human Factors in Cyber SecurityVerified email at unsw.edu.au
Robert S LarameeAssociate Professor, School of Computer Science, University of NottinghamVerified email at nottingham.ac.uk
Gordon R.T. WrightGoldsmithsVerified email at gold.ac.uk
Mark W. JonesSwansea UniversityVerified email at swan.ac.uk
Lewis HalseyProfessor of Environmental Physiology, University of RoehamptonVerified email at roehampton.ac.uk
Michael I FriswellProfessor of Aerospace Structures, Swansea UniversityVerified email at swansea.ac.uk
Emily ShepardSwansea UniversityVerified email at swansea.ac.uk
Rory P. WilsonProfessor in Aquatic Biology, Swansea UniversityVerified email at swansea.ac.uk
Owen R. BidderPost-Doctoral Researcher, University of California, BerkeleyVerified email at berkeley.edu
Dr. Shancang LiSenior Lecturer, UWEVerified email at uwe.ac.uk
Jim SmithProfessor in Interactive Artificial Intelligence, University of the West of EnglandVerified email at uwe.ac.uk
Simon WaltonOxford UniversityVerified email at oerc.ox.ac.uk
Follow
Phil Legg
Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage