Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Darren MundyUniversity Of HullVerified email at hull.ac.uk
Romain LabordeUniversity Paul Sabatier / Institut de Recherche en Informatique de ToulouseVerified email at irit.fr
Luís AntunesPorto UniversityVerified email at dcc.fc.up.pt
Ricardo João Cruz-CorreiaCINTESIS - Faculdade de Medicina da Universidade do PortoVerified email at med.up.pt
Gansen ZHAOSouth China Normal UniversityVerified email at scnu.edu.cn
Ana FerreiraFaculdade de Medicina do PortoVerified email at med.up.pt
Kaniz FatemaAston UniversityVerified email at aston.ac.uk
Prof. Richard O. SinnottSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Rogério de LemosUniversity of Kent, UKVerified email at kent.ac.uk
Kristy W. S. SiuUniversity of KentVerified email at kent.ac.uk
M. Angela Sasse FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
John WattIT Services, University of GlasgowVerified email at glasgow.ac.uk
Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
Ali SajjadBT Applied ResearchVerified email at bt.com
Anthony StellSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Michael WilsonPrincipal Scientist, STFC Rutherford Appleton LaboratoryVerified email at stfc.ac.uk
Alvaro ArenasProfesor de Sistemas de Información y TecnologíasVerified email at ie.edu
Ilsun YouKookmin UniversityVerified email at kookmin.ac.kr
Bart De DeckerProfessor of Computer Science, KU LeuvenVerified email at cs.kuleuven.be
Laura PearlmanComputer Scientist, University of Southern CaliforniaVerified email at isi.edu
Follow
David W Chadwick
Emeritus Professor, University of Kent. Product Director, Crossword Cybersecurity PLC
Verified email at kent.ac.uk - Homepage