Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Xavier BellekensLupovis.ioVerified email at lupovis.io
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk
Harjinder Singh LallieUniversity Reader (Cyber Security), University of WarwickVerified email at warwick.ac.uk
Dr Gregory EpiphaniouReader in Security Engineering, University of WarwickVerified email at warwick.ac.uk
Ben CollierLecturer in Digital Methods, University of EdinburghVerified email at cl.cam.ac.uk
Shane HorganEdinburgh Napier UniveristyVerified email at napier.ac.uk
Graham I. JohnsonAbertay UniversityVerified email at ncr.com
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
Richard JonesSenior Lecturer in Criminology, University of EdinburghVerified email at ed.ac.uk
Robert Ian FergusonSenior Lecturer in Digital Forensics, Abertay UniversityVerified email at abertay.ac.uk
Tolga ÜnlüAbertay UniversityVerified email at uad.ac.uk
Marc KyddAbertay UniversityVerified email at abertay.ac.uk
Merve SahinSAP Security ResearchVerified email at eurecom.fr
Cedric HebertSAP Security ResearchVerified email at sap.com
Adam RapleyUniversity of BristolVerified email at bristol.ac.uk
Martina ZiefleRWTH Aachen UniversityVerified email at comm.rwth-aachen.de
Philipp BraunerPostdoc, RWTH Aachen UniversityVerified email at rwth-aachen.de
Jamie O'HareAbertay UniversityVerified email at abertay.ac.uk