Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
- Dr Cherdantseva YuliaCardiff UniversityVerified email at cardiff.ac.uk
- Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
- David HutchisonEmeritus Professor, Lancaster UniversityVerified email at lancaster.ac.uk
- Antonio CauSenior Research Fellow, De Montfort UniversityVerified email at dmu.ac.uk
- Francois SieweDe Montfort UniversityVerified email at dmu.ac.uk
- Victoria DegelerUniversity of AmsterdamVerified email at uva.nl
- Panos LouvierisProfessor of Information Systems, Brunel University LondonVerified email at brunel.ac.uk
- Natalie ClewleyBrunel UniversityVerified email at brunel.ac.uk
- Mark HallHonorary Research Associate, University of Waikato, New ZealandVerified email at cs.waikato.ac.nz
- Stephan Reiff-MarganiecProfessor in Computer Science and Head of School of Computing and Engineering, University of DerbyVerified email at derby.ac.uk