Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Theo DimitrakosProfessorial Fellow, University of KentVerified email at ifiptm.org
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
- Nektarios GeorgalasBT Intel Co-lab Director, British TelecomVerified email at bt.com
- Ali SajjadBT Applied ResearchVerified email at bt.com
- Joshua DanielOnyx, JPMorgan Chase & Co.Verified email at bt.com
- David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdVerified email at kent.ac.uk
- Srinath SrinivasaIIIT BangaloreVerified email at iiitb.ac.in
- Srinivas GuntupalliSoftware Engineer, NetskopeVerified email at netskope.com
- Subramanian NeelakantanSenior Director (R&D), C-DACVerified email at cdac.in
- Satyanarayana NCentre for Development of Advanced Computing, HyderabadVerified email at cdac.in
- Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
- George SpanoudakisProfessor, City University LondonVerified email at city.ac.uk
- Prof. Pete BurnapProfessor of Data Science & Cybersecurity, Cardiff University School of Computer ScienceVerified email at cs.cardiff.ac.uk
- Yogachandran RAHULAMATHAVANReader in Cybersecurity and Privacy, Loughborough University, UKVerified email at lboro.ac.uk
- Mariam KiranOak Ridge National LaboratoryVerified email at ornl.gov
- Jordi GuitartUniversitat Politècnica de Catalunya (UPC); Barcelona Supercomputing Center (BSC)Verified email at ac.upc.edu
- Jorge Ejarque ArtigasResearcher at Workflows and Distributed Computing Group, Barcelona Supercomputing CenterVerified email at bsc.es
- Petter SvärdUmeå UniversityVerified email at cs.umu.se
- Daniel EsplingPhD, Computing Science, Umeå UniversityVerified email at cs.umu.se
- Johan TordssonElastisys and Umeå University (computing science)Verified email at cs.umu.se