Get my own profile
Public access
View all3 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Dinesh VermaIBMVerified email at us.ibm.com
- Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
- Dave BrainesIBM Research, UKVerified email at uk.ibm.com
- Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
- Greg CirincioneARLVerified email at mail.mil
- Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
- Mario Gómez MartínezAssociate Professor (UPV)Verified email at dsic.upv.es
- Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Verified email at sci.brooklyn.cuny.edu
- Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
- Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
- Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
- Lance KaplanArmy Research LaboratoryVerified email at mail.mil
- Christopher GibsonIBM Research, IBM UKVerified email at uk.ibm.com
- Diane FelmleeProfessor of Sociology, Pennsylvania UniversityVerified email at psu.edu
- Derek SleemanProfessor of Computing Science, The University, Aberdeen, UKVerified email at abdn.ac.uk
- Alice TonioloUniversity of St AndrewsVerified email at st-andrews.ac.uk
- Nir OrenProfessor at the University of AberdeenVerified email at abdn.ac.uk