Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Xavier BellekensLupovis.ioVerified email at lupovis.io
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
- Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk
- Harjinder Singh LallieUniversity Reader (Cyber Security), University of WarwickVerified email at warwick.ac.uk
- Dr Gregory EpiphaniouReader in Security Engineering, University of WarwickVerified email at warwick.ac.uk
- Ben CollierLecturer in Digital Methods, University of EdinburghVerified email at cl.cam.ac.uk
- Shane HorganEdinburgh Napier UniveristyVerified email at napier.ac.uk
- Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
- Richard JonesSenior Lecturer in Criminology, University of EdinburghVerified email at ed.ac.uk
- Graham I. JohnsonAbertay UniversityVerified email at ncr.com
- Robert Ian FergusonSenior Lecturer in Digital Forensics, Abertay UniversityVerified email at abertay.ac.uk
- Tolga ÜnlüAbertay UniversityVerified email at uad.ac.uk
- Merve SahinSAP Security ResearchVerified email at eurecom.fr
- Marc KyddAbertay UniversityVerified email at abertay.ac.uk
- Cedric HebertSAP Security ResearchVerified email at sap.com
- Adam RapleyUniversity of BristolVerified email at bristol.ac.uk
- Martina ZiefleRWTH Aachen UniversityVerified email at comm.rwth-aachen.de
- Philipp BraunerPostdoc, RWTH Aachen UniversityVerified email at rwth-aachen.de
- Jamie O'HareAbertay UniversityVerified email at abertay.ac.uk