Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Ahmad S. El AhmadPhD Computer Science, Newcastle UniversityVerified email at ncl.ac.uk
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Bin ZhuMicrosoft Research AsiaVerified email at microsoft.com
- Alan BlackwellProfessor of Interdisciplinary Design, University of CambridgeVerified email at cam.ac.uk
- Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
- Jussi PalomäkiPh.D, Docent (Cognitive Science). Senior Researcher, Finnish Institute for Health and WelfareVerified email at helsinki.fi
- Utz RoedigProfessor, University College CorkVerified email at cs.ucc.ie
- Ibrahim Ethem BagciNetwork Threat Analyst & Detection Engineer at VMware, Inc.Verified email at vmware.com
- Peng ChengZhejiang UniversityVerified email at zju.edu.cn
- Ilia ShumailovGoogle DeepMindVerified email at google.com
- Aurélien BourquardPostdoctoral Fellow, MIT LinQVerified email at mit.edu
- David ModicCambridge UniversityVerified email at cl.cam.ac.uk
- Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
- Dan CiresanConndera ResearchVerified email at conndera.com
- Peter RobinsonProfessor of Computer Technology, University of CambridgeVerified email at cam.ac.uk