Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Nick PapanikolaouExaminer of Computer-Implemented Inventions at European Patent OfficeVerified email at epo.org
- Miranda MowbrayUniversity of Bristol (honorary lecturer)Verified email at bristol.ac.uk
- Yun ShenNetAppVerified email at netapp.com
- Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
- Massimo FeliciSecurity Manager, BeLux Security Risk and Innovation Lead at AccentureVerified email at accenture.com
- Ronald LeenesProfessor of Techno(logy)-Regulation; Tilburg Institute for Law, Technology, and Society (TILT)Verified email at tilburguniversity.edu
- Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
- Martin Gilje JaatunSenior Scientist at SINTEF DigitalVerified email at sintef.no
- Michael GoldsmithAssociate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department ofVerified email at cs.ox.ac.uk
- Simone Fischer-HübnerProfessor, Karlstad UniversityVerified email at kau.se
- Maartje NiezenVerified email at rathenau.nl
- Chunming RongUniversity of StavangerVerified email at uis.no
- David NuñezCryptography R&D at NuCypher Inc.Verified email at nucypher.com
- Prasad RaoResearch Scientist, LinkedInVerified email at linkedin.com
- Christoph ReichProfessor of Computer ScienceVerified email at hs-furtwangen.de
- Dimitris A. GritzalisProfessor of Cybersecurity, Athens University of Economics & BusinessVerified email at aueb.gr
- Carmen Fernandez GagoUniversity of Malaga (Spain)Verified email at lcc.uma.es
- Anderson Santana de OliveiraSAP Security ResearchVerified email at sap.com