Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
- Michael GoldsmithAssociate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department ofVerified email at cs.ox.ac.uk
- Min ChenDepartment of Engineering Science, University of OxfordVerified email at oerc.ox.ac.uk
- Oliver BuckleyUniversity of East AngliaVerified email at uea.ac.uk
- David ChungPhD Researcher, Swansea UniversityVerified email at swansea.ac.uk
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- David MarshallProfessor of Computer Vision, Cardiff UniversityVerified email at cs.cardiff.ac.uk
- Ioannis AgrafiotisComputer Science Department, University of OxfordVerified email at cs.ox.ac.uk
- James E MorganCardiff UniversityVerified email at cardiff.ac.uk
- Paul L. RosinSchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cf.ac.uk
- Monica WhittyProfessor of Human Factors in Cyber SecurityVerified email at monash.edu
- Alan MillsUniversity of the West of EnglandVerified email at uwe.ac.uk
- Robert S LarameeProfessor, School of Computer Science, University of NottinghamVerified email at nottingham.ac.uk
- Gordon R.T. WrightGoldsmithsVerified email at gold.ac.uk
- Andrew McCarthySenior Lecturer, University of the West of EnglandVerified email at uwe.ac.uk
- Mark W. JonesProfessor, Computer Science, Swansea UniversityVerified email at swan.ac.uk
- Dr. Shancang LiSenior Lecturer, UWEVerified email at uwe.ac.uk
- Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
- Essam GhadafiSenior Lecturer, Newcastle UniversityVerified email at ncl.ac.uk
- Jim SmithProfessor in Interactive Artificial Intelligence, University of the West of EnglandVerified email at uwe.ac.uk
Follow
Phil Legg
Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage