Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xavier BellekensLupovis.ioEmail verificata su lupovis.io
- Jason R.C. NurseReader in Cyber Security, University of KentEmail verificata su kent.ac.uk
- Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickEmail verificata su warwick.ac.uk
- Arnau ErolaResearcher, Department of Computer Science, University Of OxfordEmail verificata su cs.ox.ac.uk
- Harjinder Singh LallieUniversity Reader (Cyber Security), University of WarwickEmail verificata su warwick.ac.uk
- Dr Gregory EpiphaniouAssociate Professor of Security Engineering, University of WarwickEmail verificata su warwick.ac.uk
- Ben CollierLecturer in Digital Methods, University of EdinburghEmail verificata su cl.cam.ac.uk
- Shane HorganEdinburgh Napier UniveristyEmail verificata su napier.ac.uk
- Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeEmail verificata su strath.ac.uk
- Richard JonesSenior Lecturer in Criminology, University of EdinburghEmail verificata su ed.ac.uk
- Robert Ian FergusonSenior Lecturer in Digital Forensics, Abertay UniversityEmail verificata su abertay.ac.uk
- Graham I. JohnsonAbertay UniversityEmail verificata su ncr.com
- Tolga ÜnlüAbertay UniversityEmail verificata su uad.ac.uk
- Marc KyddAbertay UniversityEmail verificata su uad.ac.uk
- Cedric HebertSAP Security ResearchEmail verificata su sap.com
- Merve SahinSAP Security ResearchEmail verificata su eurecom.fr
- Adam RapleyUniversity of BristolEmail verificata su bristol.ac.uk
- Martina ZiefleRWTH Aachen UniversityEmail verificata su comm.rwth-aachen.de
- Philipp BraunerPostdoc, RWTH Aachen UniversityEmail verificata su rwth-aachen.de
- Jamie O'HareAbertay UniversityEmail verificata su abertay.ac.uk
Segui