Get my own profile
Public access
View all36 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Andreas MautheProfessor IT & Data Security, University Koblenz-LandauVerified email at uni-koblenz.de
David HutchisonEmeritus Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Dimitrios PezarosProfessor of Computer Networks and RAEng Research Chair, University of GlasgowVerified email at glasgow.ac.uk
Alberto E. Schaeffer-FilhoFederal University of Rio Grande do Sul (UFRGS)Verified email at inf.ufrgs.br
Petros SpachosVerified email at ieee.org
Noor ShiraziLancaster UniversityVerified email at lancaster.ac.uk
Ricardo MorlaAssistant Professor, University of PortoVerified email at fe.up.pt
Paul SmithAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Simon MalinowskiAssociate Professor, ISTIC, Univ. RennesVerified email at irisa.fr
Dr Max EizaSenior Lecturer in Computer Security, Liverpool John Moores UniversityVerified email at ljmu.ac.uk
T J OWENSBRUNEL UNIVERSITYVerified email at brunel.ac.uk
Qiang NiProfessor, Lancaster UniversityVerified email at lancaster.ac.uk
Hyun-chul KimDept. of Software, Sangmyung University, South KoreaVerified email at smu.ac.kr
Hema A MurthyProfessor of Computer Science and Engineering, IIT MadrasVerified email at cse.iitm.ac.in
Miguel RodriguesProfessor of Information Theory and Processing, University College LondonVerified email at ucl.ac.uk
Stephen J. SimpsonThe University of SydneyVerified email at sydney.edu.au
Matt KnudsonNASA Ames Research CenterVerified email at nasa.gov
Periklis ChatzimisiosProfessor, International Hellenic University,Thessaloniki, GreeceVerified email at ihu.gr
James CyriacPhDVerified email at ucalgary.ca
Saad Yunus SaitSRM Institute of Science and Technology, KattankulathurVerified email at srmist.edu.in