Crea il mio profilo
Accesso pubblico
Visualizza tutto89 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Marina JirotkaUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Damian Okaibedi EkeUniversity of NottinghamEmail verificata su nottingham.ac.uk
- Kutoma WakunumaDe Montfort UniversityEmail verificata su dmu.ac.uk
- Laurence BrooksUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Inga UlnicaneUniversity of BirminghamEmail verificata su bham.ac.uk
- Grace EdenUniversity of TartuEmail verificata su ut.ee
- Mark J RyanWageningen University and ResearchEmail verificata su wur.nl
- Job TimmermansNetherlands Defense AcademyEmail verificata su mindef.nl
- Catherine FlickProfessor of Ethics and Games Technology, Staffordshire UniversityEmail verificata su staffs.ac.uk
- Kevin MacnishSopra SteriaEmail verificata su soprasteria.com
- Simisola AkintoyeDe Montfort UniversityEmail verificata su dmu.ac.uk
- Alexander BremUniversity of Stuttgart, University of Southern DenmarkEmail verificata su eni.uni-stuttgart.de
- Stephen RaineyUniversity of DelftEmail verificata su tudelft.nl
- Veikko IkonenVTT Technical Research Centre of Finland LtdEmail verificata su vtt.fi
- George OgohSenior Research Fellow, University of NottinghamEmail verificata su nottingham.ac.uk
- Simon RogersonProfessor Emeritus, Centre for Computing and Social Responsiblity, De Montfort UniversityEmail verificata su dmu.ac.uk
- David WrightTrilateral ResearchEmail verificata su trilateralresearch.com
- Tonii LeachDepartment of Information Security, Royal Holloway University of LondonEmail verificata su rhul.ac.uk
- Yingqin ZhengEssex Business SchoolEmail verificata su essex.ac.uk
- Adam EdwardsCardiff UniversityEmail verificata su cardiff.ac.uk