Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityEmail verificata su cybersecuritycrc.org.au
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceEmail verificata su cs.cardiff.ac.uk
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityEmail verificata su napier.ac.uk
- Andrew BlythUniversity of South walesEmail verificata su southwales.ac.uk
- Dr Cherdantseva YuliaCardiff UniversityEmail verificata su cardiff.ac.uk
- David HutchisonEmeritus Professor, Lancaster UniversityEmail verificata su lancaster.ac.uk
- Antonio CauSenior Research Fellow, De Montfort UniversityEmail verificata su dmu.ac.uk
- Francois SieweDe Montfort UniversityEmail verificata su dmu.ac.uk
- Victoria DegelerUniversity of AmsterdamEmail verificata su uva.nl
- Panos LouvierisProfessor of Information Systems, Brunel University LondonEmail verificata su brunel.ac.uk
- Natalie ClewleyBrunel UniversityEmail verificata su brunel.ac.uk
- Stephan Reiff-MarganiecProfessor in Computer Science and Head of School of Computing and Engineering, University of DerbyEmail verificata su derby.ac.uk
- Mark HallHonorary Research Associate, University of Waikato, New ZealandEmail verificata su cs.waikato.ac.nz