Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
- Johann A. BriffaProfessor, University of MaltaVerified email at um.edu.mt
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Ioana BoureanuProfessor, University of SurreyVerified email at surrey.ac.uk
- Jorden WhitefieldIndependent ResearcherVerified email at jwhitefield.co.uk
- Jinguang HanSoutheast University, ChinaVerified email at seu.edu.cn
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Tim BrownAcademic in RF, Antennas and Propagation, University of SurreyVerified email at surrey.ac.uk
- Thomas DiakosPhD candidate of Computer Science, University of SurreyVerified email at surrey.ac.uk
- Hans Georg SchaathunNTNUVerified email at ntnu.no
- Victor ButtigiegUniversity of MaltaVerified email at um.edu.mt
- Zach SmithUniversity of LuxembourgVerified email at uni.lu