Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Prof. Paul VickersProfessor of Computer Science & Sonification, Northumbria UniversityEmail verificata su northumbria.ac.uk
- Alan RobinsonSolent University - retiredEmail verificata su solent.ac.uk
- Dr Kuo-Ming ChaoUniversity of RoehamptonEmail verificata su roehampton.ac.uk
- Charles MorissetReader in Security, Newcastle UniversityEmail verificata su ncl.ac.uk
- Iryna YevseyevaDe Montfort University, LeicesterEmail verificata su dmu.ac.uk
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Jeremy EllmanRosen GroupEmail verificata su rosen-group.com
- Alison PickardReader / Associate Professor in Information Science, Faculty of Engineering and EnvironmentEmail verificata su unn.ac.uk
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKEmail verificata su bham.ac.uk
- Thomas Gloedence GmbHEmail verificata su tu-dresden.de
- Sue ChildsSenior Research Fellow, iSchool, Faculty of Engineering & Environment, Northumbria UniversityEmail verificata su northumbria.ac.uk
- Ciara KieransUniversity of LiverpoolEmail verificata su liverpool.ac.uk