Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
Konstantinos XynosProfessor, Noroff University CollegeVerified email at noroff.no
Theo TryfonasUniversity of BristolVerified email at bristol.ac.uk
Craig ValliSafeNSecureCyberVerified email at safensecurecyber.com
Richard J. WhiteLecturer in Computer Science, Cardiff University (retired)Verified email at rjwhite.tk
Suzanne EmburyReader in Software Engineering, Dept of Computer Science, The University of ManchesterVerified email at cs.manchester.ac.uk
Glenn S. DardickProfessor of CybersecurityVerified email at dardick.net
Mikhaila BurgessEDGE Innovation Unit, New College of the HumanitiesVerified email at nchlondon.ac.uk
Alastair IronsDeputy Vice Chancellor and Professor of Computer Science, Abertay UniversityVerified email at abertay.ac.uk
Daniel CunliffeReader, University of South WalesVerified email at southwales.ac.uk
Theodoros SpyridopoulosUniversity of the West of England, BristolVerified email at uwe.ac.uk
Morten GoodwinProfessor, Centre for Artificial Intelligence Research, University of AgderVerified email at uia.no
George OikonomouSenior Lecturer in IoT Networking, University of BristolVerified email at bristol.ac.uk
Panagiotis AndriotisUWE Bristol, National Institute of InformaticsVerified email at uwe.ac.uk
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
Stilianos VidalisPrincipal Lecturer, University of HertfordshireVerified email at herts.ac.uk
Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se