Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Konstantinos MarkantonakisProfessor of Information SecurityEmail verificata su rhul.ac.uk
- Raja Naeem AkramDepartment of Computer Science, University of AberdeenEmail verificata su abdn.ac.uk
- Keith MayesRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Carlton ShepherdNewcastle University, UKEmail verificata su ncl.ac.uk
- Eibe FrankProfessor, Department of Computer Science, University of WaikatoEmail verificata su cs.waikato.ac.nz
- Emmanuel ConchonAssistant professor, University of Limoges, XLIMEmail verificata su unilim.fr
- HAFIZAH MANSORInternational Islamic University MalaysiaEmail verificata su iium.edu.my
- Damien SauveronProfessor in Computer Science, University of LimogesEmail verificata su unilim.fr
- Robert P. LeeGMO GlobalSignEmail verificata su globalsign.com
- Lorenzo CavallaroUniversity College LondonEmail verificata su ucl.ac.uk
- Manos PanaousisProfessor of Cyber Security, Centre for Sustainable Cyber Security (CS2), University of GreenwichEmail verificata su greenwich.ac.uk
- Danushka JayasingheRoyal Holloway, University of LondonEmail verificata su live.rhul.ac.uk
- Assad UmarPhD candidate at Royal Holloway, University of LondonEmail verificata su live.rhul.ac.uk
- Gerhard HanckeProfessor, City University of Hong Kong, IEEE FellowEmail verificata su cityu.edu.hk