Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Petar RadanlievUniversity of OxfordVerified email at cs.ox.ac.uk
- David De RoureProfessor of e-Research, University of OxfordVerified email at oerc.ox.ac.uk
- Hongmei HeProfessor in Artificial Intelligence for Robotics and Autonomous System at the University of SalfordVerified email at salford.ac.uk
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
- Dr Gregory EpiphaniouReader in Security Engineering, University of WarwickVerified email at warwick.ac.uk
- Madeline CarrProfessor of Global Politics and Cyber SecurityVerified email at ucl.ac.uk
- Barnaby CraggsBristol Cyber Security Group, University of BristolVerified email at bristol.ac.uk
- Francisca Onaolapo OladipoProfessor and Vice-Chancellor, Thomas Adewumi UniversityVerified email at tau.edu.ng
- Kwetishe Joro DanjumaModibbo Adama UniversityVerified email at mau.edu.ng
- Professor Ashutosh TiwariAirbus / RAEng Research Chair in Digitisation for Manufacturing, The University of Sheffield, UKVerified email at sheffield.ac.uk
- Murtala MuhammadResearch Student, Computer Network and Telecommunication
- Taiwo KOLAJO (PhD)Federal University LokojaVerified email at fulokoja.edu.ng
- Timothy FrenchTeaching Fellow Cyber Bath UniversityVerified email at bath.ac.uk
- Jeremy WatsonLecturer, University of CanterburyVerified email at canterbury.ac.nz