Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
Konstantinos XynosVerified email at mycenx.com
Theo TryfonasProfessor of Infrastructure Systems and Urban Innovation, University of BristolVerified email at bristol.ac.uk
Craig ValliSafeNSecureCyberVerified email at safensecurecyber.com
Richard J. WhiteLecturer in Computer Science, Cardiff University (retired)Verified email at rjwhite.tk
Suzanne EmburyReader in Software Engineering, Dept of Computer Science, The University of ManchesterVerified email at cs.manchester.ac.uk
Glenn S. DardickProfessor of CybersecurityVerified email at dardick.net
Mikhaila BurgessEDGE Innovation Unit, Northeastern University - LondonVerified email at nulondon.ac.uk
Alastair IronsDeputy Vice Chancellor and Professor of Computer Science, Abertay UniversityVerified email at abertay.ac.uk
Daniel CunliffeReader, University of South WalesVerified email at southwales.ac.uk
Theodoros SpyridopoulosCardiff UniversityVerified email at cardiff.ac.uk
Morten GoodwinProfessor, Centre for Artificial Intelligence Research, University of AgderVerified email at uia.no
Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
George OikonomouAssociate Professor or IoT Networking, University of BristolVerified email at bristol.ac.uk
Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Stilianos VidalisDeputy Head of Department, University of HertfordshireVerified email at herts.ac.uk
Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se
Elizabeth ThomasINSERMU1093 Université de BourgogneVerified email at u-bourgogne.fr