Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Konstantinos MarkantonakisProfessor of Information SecurityVerified email at rhul.ac.uk
Raja Naeem AkramDepartment of Computer Science, University of AberdeenVerified email at abdn.ac.uk
Keith MayesRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Carlton ShepherdRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Eibe FrankProfessor, Department of Computer Science, University of WaikatoVerified email at cs.waikato.ac.nz
HAFIZAH MANSORInternational Islamic University MalaysiaVerified email at iium.edu.my
Damien SauveronAssociate Professor with Habilitation in Computer Science, University of LimogesVerified email at unilim.fr
Emmanuel ConchonAssistant professor, University of Limoges, XLIMVerified email at unilim.fr
Robert P. LeeGMO GlobalSignVerified email at globalsign.com
Lorenzo CavallaroUniversity College LondonVerified email at ucl.ac.uk
Emmanouil PanaousisProfessor of Cyber Security, Internet of Things and Security Centre, University of GreenwichVerified email at greenwich.ac.uk
Danushka JayasingheRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
Gerhard HanckeAssociate Professor, City University of Hong Kong, IEEE FellowVerified email at cityu.edu.hk
Assad UmarPhD candidate at Royal Holloway, University of LondonVerified email at live.rhul.ac.uk