Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
- Frangiskos TopalisProfessorVerified email at central.ntua.gr
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
- Tiago CruzUniversity of Coimbra, Centre for Informatics and Systems of the University of Coimbra, DepartmentVerified email at dei.uc.pt
- Mohamed Amine Ferrag, PhD, SIEEEAssociate Professor of AI & Cybersecurity, Guelma UniversityVerified email at univ-guelma.dz
- Sotiris MoschoyiannisUniversity of SurreyVerified email at surrey.ac.uk
- Michalis MavrovouniotisERATOSTHENES Centre of Excellence, Cyprus University of TechnologyVerified email at eratosthenes.org.cy
- Antonios ArgyriouAssociate Professor, Electrical & Computer Engineering, University of ThessalyVerified email at uth.gr
- Pavlina FragkouDepartment of Informatics, Technological Educational Institute of AthensVerified email at teiath.gr
- Ki-Hyung KimAjou UniversityVerified email at ajou.ac.kr
- Jianmin JiangChina 1000-plan Distinguished Professor, Shenzhen University, ChinaVerified email at szu.edu.cn
- Dimitrios KosmanosPhD, University of ThessalyVerified email at uth.gr
- Dimitrios KatsarosAssociate Professor, University of ThessalyVerified email at inf.uth.gr
- Lei Shu (舒磊)Professor, Nanjing Agricultural University, China and Lincoln Professor, University of Lincoln, UKVerified email at njau.edu.cn
- Kyriaki TsilikaAssociate Professor, Department of Economics, University of ThessalyVerified email at uth.gr