Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Arshad JhumkaUniversity of LeedsVerified email at leeds.ac.uk
- Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
- Matthew BradburySchool of Computing and Communications, Lancaster UniversityVerified email at lancaster.ac.uk
- Tim WatsonProfessor of Cyber Security, Loughborough UniversityVerified email at lboro.ac.uk
- Julián Andrés Galindo LosadaProfesor PHD in Informatics (HCI), Escuela Politécnica Nacional, Facultad de ingeniería en sistemasVerified email at epn.edu.ec
- Harjinder Singh LallieUniversity Reader (Cyber Security), University of WarwickVerified email at warwick.ac.uk
- Gabriela SuntaxiEscuela Politécnica NacionalVerified email at epn.edu.ec
- Roberto AndradeUniversidad San Francisco de Quito USFQVerified email at usfq.edu.ec
- Gabriela MartinezCoordinadora Técnica de la Unidad de Gestión de Educación Virtual, Universidad Andina Simón BolívarVerified email at uasb.edu.ec
- Carlos Ayala-TipanEscuela Politécnica NacionalVerified email at epn.edu.ec
- Edison Loza-AguirreUniversidad San Francisco de Quito USFQVerified email at usfq.edu.ec