Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Falko DresslerTechnische Universität BerlinVerified email at ccs-labs.org
David EckhoffTUM CREATEVerified email at tum-create.edu.sg
Helge JanickeCyber Security Cooperative Research CentreVerified email at cybersecuritycrc.org.au
Christoph SommerChair of Networked Systems Modeling, TU Dresden, GermanyVerified email at tu-dresden.de
Ying HeThe University of NottinghamVerified email at nottingham.ac.uk
Eerke BoitenSchool of Computer Science and Informatics, De Montfort University, UKVerified email at dmu.ac.uk
Yuchen ZhaoUniversity of YorkVerified email at york.ac.uk
Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
Ali H. Al-BayattiAssociate Professor, Cyber Technology Institute, De Montfort UniversityVerified email at dmu.ac.uk
Iryna YevseyevaDe Montfort University, LeicesterVerified email at dmu.ac.uk
Thomas Halva LabellaLuxoftVerified email at online.de
Joseph Richard SnapeLecturer and Research Fellow, Institute of Energy and Sustainable Development, De MontfortVerified email at dmu.ac.uk
Lee HadlingtonSenior Lecturer In Cyberpsychology, Nottingham Trent UniversityVerified email at ntu.ac.uk
Ulrich RüdeProfessor for Computational Science and Engineering, FAU Erlangen-NürnbergVerified email at fau.de
Aladdin AyeshProfessor of Artificial Intelligence, University of Aberdeen, UKVerified email at abdn.ac.uk
Kai-Steffen HielscherAssitant Professor Computer Science, FAU ErlangenVerified email at fau.de