Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Konstantinos MarkantonakisProfessor of Information SecurityVerified email at rhul.ac.uk
- Keith MayesRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Damien SauveronProfessor in Computer Science, University of LimogesVerified email at unilim.fr
- Iakovos GurulianTEKA Systems S.A.Verified email at tekasystems.com
- Carlton ShepherdNewcastle University, UKVerified email at ncl.ac.uk
- HAFIZAH MANSORInternational Islamic University MalaysiaVerified email at iium.edu.my
- Benjamin SemalInformation Security Group, Royal Holloway University of LondonVerified email at live.rhul.ac.uk
- Freya Sheer HardwickStudent at Royal Holloway, University Of LondonVerified email at live.rhul.ac.uk
- Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
- Emmanuel ConchonAssistant professor, University of Limoges, XLIMVerified email at unilim.fr
- Eibe FrankProfessor, Department of Computer Science, University of WaikatoVerified email at cs.waikato.ac.nz
- Jan KalbantnerRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
- James TapsellStudent, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Manos PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
- Robert Caddell AtkinsonUniversity of StrathclydeVerified email at strath.ac.uk
- Maryline LaurentTelecom SudParisVerified email at telecom-sudparis.eu
- Assad UmarPhD candidate at Royal Holloway, University of LondonVerified email at live.rhul.ac.uk
Follow
Raja Naeem Akram
Department of Computer Science, University of Aberdeen
Verified email at abdn.ac.uk - Homepage