Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickEmail verificata su warwick.ac.uk
Reihaneh Safavi -NainiUniversity of CalgaryEmail verificata su ucalgary.ca
Patrick McCorryCrypto enthusiastEmail verificata su arbitrum.foundation
Ehsan ToreiniDepartment of Computer Science, University of SurreyEmail verificata su surrey.ac.uk
Maryam MehrnezhadReader, Information Security Department, Royal Holloway University of London, UKEmail verificata su rhul.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkEmail verificata su cl.cam.ac.uk
Christopher BattarbeeSorbonne UniversityEmail verificata su york.ac.uk
Philokypros P. IoulianouEmail verificata su york.ac.uk
SAMIRAN BAGUniversity of WarwickEmail verificata su warwick.ac.uk
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityEmail verificata su ncl.ac.uk
Roberto MetereLecturer (Assistant Professor), University of YorkEmail verificata su york.ac.uk
Helen PetrieProfessor Emerita of Human Computer InteractionEmail verificata su york.ac.uk
Malte MöserChainalysisEmail verificata su maltemoeser.de
Mario StreflerKarlsruhe Institute of TechnologyEmail verificata su kit.edu
Shaoquan JiangUniversity of WindsorEmail verificata su uwindsor.ca
M. Jason HinekInstructor, School of Computer of Science, Carleton UniversityEmail verificata su scs.carleton.ca
Dr. Poonam YadavA/ Professor & Senior Lecturer at Uni of York / Visiting Researcher at University of CambridgeEmail verificata su york.ac.uk
Ludovic PerretEPITA/LREEmail verificata su epita.fr
Changyu DongGuangzhou UniversityEmail verificata su gzhu.edu.cn
Philip O. OgunbonaProfessor of Computer Science, University of WollongongEmail verificata su uow.edu.au