Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Steve KremerInriaVerified email at inria.fr
Eike RitterSenior Lecturer in Computer Science, University of Birmingham, UKVerified email at cs.bham.ac.uk
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
Pierre Yves SchobbensProfessor of Computer Science, University of Namur (FUNDP)Verified email at unamur.be
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Michael HuthProfessor of Computer Science, Computing, Imperial College LondonVerified email at imperial.ac.uk
Dimitar P. GuelevAssociate Professor of Logic, Bulgarian Academy of SciencesVerified email at math.bas.bg
Jiangshan Yu (于江山)ARC DECRA Fellow and Senior Lecturer, Monash UniversityVerified email at monash.edu
Alessio R LomuscioImperial College LondonVerified email at imperial.ac.uk
Loretta Ilaria ManciniUniversity of BirminghamVerified email at cs.bham.ac.uk
Vincent ChevalInria Paris, FranceVerified email at inria.fr
Gurchetan GrewalSecurity Architect at Jaguar Land RoverVerified email at jaguarlandrover.com
Sergiu Bursucpostdoctoral researcher, University of LuxembourgVerified email at uni.lu
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Michael FisherProfessor of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Jia LiuResearcher at Fetch.AIVerified email at fetch.ai
Marta KwiatkowskaProfessor of Computing Systems, University of OxfordVerified email at comlab.ox.ac.uk
Follow