Get my own profile
Public access
View all24 articles
12 articles
available
not available
Based on funding mandates
Co-authors
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Paul SmartSenior Research Fellow, University of SouthamptonVerified email at ecs.soton.ac.uk
Daniel HarborneCrime and Security Research Institute, Cardiff UniversityVerified email at cardiff.ac.uk
Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
David MottUniversity of SouthamptonVerified email at soton.ac.uk
Nigel ShadboltProfessor of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
Richard John TomsettAmazonVerified email at amazon.co.uk
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Jie BaoMemectVerified email at memect.co
Tien PhamMITRE LabsVerified email at mitre.org
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Moustafa F. AlzantotGoogle ResearchVerified email at google.com
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Will WebberleySchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
Dong HuynhKing's College LondonVerified email at kcl.ac.uk
Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com
Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov