Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
- Michael GoldsmithAssociate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department ofVerified email at cs.ox.ac.uk
- Min ChenDepartment of Engineering Science, University of OxfordVerified email at oerc.ox.ac.uk
- Oliver BuckleyLoughborough UniversityVerified email at lboro.ac.uk
- David ChungPhD Researcher, Swansea UniversityVerified email at swansea.ac.uk
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- David MarshallProfessor of Computer Vision, Cardiff UniversityVerified email at cs.cardiff.ac.uk
- Ioannis AgrafiotisComputer Science Department, University of OxfordVerified email at cs.ox.ac.uk
- James E MorganCardiff UniversityVerified email at cardiff.ac.uk
- Paul L. RosinSchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cf.ac.uk
- Monica WhittyProfessor of Human Factors in Cyber SecurityVerified email at monash.edu
- Alan MillsUniversity of the West of EnglandVerified email at uwe.ac.uk
- Robert S LarameeProfessor, School of Computer Science, University of NottinghamVerified email at nottingham.ac.uk
- Gordon R.T. WrightGoldsmithsVerified email at gold.ac.uk
- Andrew McCarthySenior Lecturer, University of the West of EnglandVerified email at uwe.ac.uk
- Mark W. JonesProfessor, Computer Science, Swansea UniversityVerified email at swan.ac.uk
- Jim SmithProfessor in Interactive Artificial Intelligence, University of the West of EnglandVerified email at uwe.ac.uk
- Dr. Shancang LiSenior Lecturer, UWEVerified email at uwe.ac.uk
- Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
- Essam GhadafiSenior Lecturer, Newcastle UniversityVerified email at ncl.ac.uk
Follow
Phil Legg
Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage