Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tim KellyProfessor of High Integrity SystemsEmail verificata su york.ac.uk
- Andrew RaeAssociate Professor, Griffith UniversityEmail verificata su griffith.edu.au
- John McDermidUniversity of YorkEmail verificata su york.ac.uk
- Richard HawkinsSenior Research Fellow, Department of Computer Science, The University of YorkEmail verificata su cs.york.ac.uk
- John A. ClarkProfessor of Computer and Information Security, University of SheffieldEmail verificata su sheffield.ac.uk
- Jonathan M. AitkenUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Kester CleggResearch AssociateEmail verificata su cs.york.ac.uk
- Ibrahim HabliProfessor of Safety-Critical Systems at the University of YorkEmail verificata su york.ac.uk
- Xueyi ZouHuawei Noah's Ark LabEmail verificata su huawei.com
- Manuel OriolConstructor Institute SchaffhausenEmail verificata su constructor.org
- Matthew PatrickDepartment of Dermatology, University of MichiganEmail verificata su umich.edu
- Catherine MenonUniversity of HertfordshireEmail verificata su imperial.ac.uk
- zaid tahirPhD Researcher at ECE dept Boston UniversityEmail verificata su bu.edu
- Mark NicholsonEmail verificata su york.ac.uk
- Mario GleirscherPostdoctoral Researcher, University of BremenEmail verificata su uni-bremen.de
- James A. DouthwaitePost-Doctoral Scientist, University Of SheffieldEmail verificata su sheffield.ac.uk
- Radu CalinescuProfessor of Computer Science, University of YorkEmail verificata su york.ac.uk
- James LawThe University of SheffieldEmail verificata su sheffield.ac.uk
- Victoria HodgeUniversity of York, UKEmail verificata su york.ac.uk
- Teodor GhetiuUniversity of SibiuEmail verificata su ulbsibiu.ro