Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Petar RadanlievUniversity of OxfordEmail verificata su cs.ox.ac.uk
- David De RoureProfessor of e-Research, University of OxfordEmail verificata su oerc.ox.ac.uk
- Jason R.C. NurseReader in Cyber Security, University of KentEmail verificata su kent.ac.uk
- Hongmei HeProfessor in Artificial Intelligence for Robotics and Autonomous System at the University of SalfordEmail verificata su salford.ac.uk
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceEmail verificata su cs.cardiff.ac.uk
- Madeline CarrProfessor of Global Politics and Cyber SecurityEmail verificata su ucl.ac.uk
- Dr Gregory EpiphaniouAssociate Professor of Security Engineering, University of WarwickEmail verificata su warwick.ac.uk
- Barnaby CraggsBristol Cyber Security Group, University of BristolEmail verificata su bristol.ac.uk
- Francisca Onaolapo OladipoProfessor and Vice-Chancellor, Thomas Adewumi UniversityEmail verificata su tau.edu.ng
- Kwetishe Joro DANJUMAModibbo Adama UniversityEmail verificata su mau.edu.ng
- Professor Ashutosh TiwariAirbus / RAEng Research Chair in Digitisation for Manufacturing, The University of Sheffield, UKEmail verificata su sheffield.ac.uk
- Murtala MuhammadResearch Student, Computer Network and Telecommunication
- Taiwo KOLAJO (PhD)Federal University LokojaEmail verificata su fulokoja.edu.ng
- Timothy FrenchTeaching Fellow Cyber Bath UniversityEmail verificata su bath.ac.uk
- Jeremy WatsonLecturer, University of CanterburyEmail verificata su canterbury.ac.nz