Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
Xavier BellekensLupovis.ioVerified email at lupovis.io
Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk
Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
Harjinder Singh LallieUniversity Reader (Cyber Security), University of WarwickVerified email at warwick.ac.uk
Dr Gregory EpiphaniouReader in Security Engineering, University of WarwickVerified email at warwick.ac.uk
Ben CollierLecturer in Digital Methods, University of EdinburghVerified email at cl.cam.ac.uk
Shane HorganEdinburgh Napier UniveristyVerified email at napier.ac.uk
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
Graham I. JohnsonAbertay UniversityVerified email at ncr.com
Richard JonesSenior Lecturer in Criminology, University of EdinburghVerified email at ed.ac.uk
Robert Ian FergusonSenior Lecturer in Digital Forensics, Abertay UniversityVerified email at abertay.ac.uk
Tolga ÜnlüAbertay UniversityVerified email at uad.ac.uk
Marc KyddAbertay UniversityVerified email at abertay.ac.uk
Merve SahinSAP Security ResearchVerified email at eurecom.fr
Cedric HebertSAP Security ResearchVerified email at sap.com
Adam RapleyUniversity of BristolVerified email at bristol.ac.uk
Martina ZiefleRWTH Aachen UniversityVerified email at comm.rwth-aachen.de
Philipp BraunerPostdoc, RWTH Aachen UniversityVerified email at rwth-aachen.de
Jamie O'HareAbertay UniversityVerified email at abertay.ac.uk