Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Konstantinos XynosVerified email at mycenx.com
Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
Theo TryfonasProfessor of Infrastructure Systems and Urban Innovation, University of BristolVerified email at bristol.ac.uk
Craig ValliSafeNSecureCyberVerified email at safensecurecyber.com
Richard J. WhiteLecturer in Computer Science, Cardiff University (retired)Verified email at rjwhite.tk
Suzanne EmburyReader in Software Engineering, Dept of Computer Science, The University of ManchesterVerified email at cs.manchester.ac.uk
Glenn S. DardickProfessor of CybersecurityVerified email at dardick.net
Mikhaila BurgessNortheastern University - LondonVerified email at nulondon.ac.uk
Alastair IronsDeputy Vice Chancellor and Professor of Computer Science, Abertay UniversityVerified email at abertay.ac.uk
Daniel CunliffeReader, University of South WalesVerified email at southwales.ac.uk
Theodoros SpyridopoulosCardiff UniversityVerified email at cardiff.ac.uk
Andy JonesUniversity of HertfordshireVerified email at herts.ac.uk
Morten GoodwinProfessor, Centre for Artificial Intelligence Research, University of AgderVerified email at uia.no
Johan van NiekerkNoroff University College / Nelson Mandela UniversityVerified email at nmmu.ac.za
Petrus MJ DelportNelson Mandela University, Noroff University CollegeVerified email at noroff.no
George OikonomouAssociate Professor or IoT Networking, University of BristolVerified email at bristol.ac.uk
Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at rhul.ac.uk
Stilianos VidalisDeputy Head of Department, University of HertfordshireVerified email at herts.ac.uk