Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Richard PayneSenior Software Engineer, Asset55Verified email at assetfiftyfive.com
Maciej KoutnyNewcastle UniversityVerified email at ncl.ac.uk
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Howard BowmanSchool of Computing, University of Kent and School of Psychology, University of BirminghamVerified email at kent.ac.uk
Paolo MissierProfessor of Big Data Engineering and AnalyticsVerified email at acm.org
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Vasa CurcinReader in health informatics, King's College LondonVerified email at doc.ic.ac.uk
Cliff B JonesProfessor of Computing Science, Newcastle University, UKVerified email at ncl.ac.uk
Hoang Nga NguyenAssociate Professor, Coventry UniversityVerified email at coventry.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
Jim DaviesUniversity of OxfordVerified email at cs.ox.ac.uk
Andreas RothSAP SEVerified email at sap.com
Alexander RomanovskySenior Research Investigator and Emeritus Professor, Newcastle University, UKVerified email at ncl.ac.uk
Augusto Cesar Alves SampaioUFPE - Universidade Federal de PernambucoVerified email at cin.ufpe.br
Alvaro MiyazawaResearch Associate, University of YorkVerified email at york.ac.uk
Finn Overgaard HansenIngeniørdocent, Aarhus University, School of EngineeringVerified email at iha.dk
Nick CookLecturer, Newcastle University, UKVerified email at ncl.ac.uk