Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Maryam MehrnezhadSchool of Computing, Newcastle University, UKVerified email at newcastle.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Mhairi AitkenThe Alan Turing InstituteVerified email at turing.ac.uk
Karen ElliottSenior Lecturer/Assoc. Professor, Newcastle University Business SchoolVerified email at newcastle.ac.uk
Matthew ForshawNational Skills Lead, The Alan Turing Institute and Senior Lecturer in Data Science, NewcastleVerified email at ncl.ac.uk
kiavash satvatUniversity of Illinois at ChicagoVerified email at uic.edu
Kovila PL CoopamootooNewcastle UniversityVerified email at newcastle.ac.uk
Aad van MoorselProfessor of Computer Science, Newcastle University, UKVerified email at ncl.ac.uk
Peyman Neamatollahi-پیمان نعمت الهیFerdowsi University of MashhadVerified email at mail.um.ac.ir
Mahmoud NaghibzadehProfessor of Computer Engineering, Ferdowsi University of MashhadVerified email at um.ac.ir
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Roberto MetereSecurity Researcher, Newcastle UniversityVerified email at ncl.ac.uk
Patrick McCorryCo-founder & CEO at PISA ResearchVerified email at ncl.ac.uk
Paolo MissierProfessor in Large Scale Information Systems, Computing Science, Newcastle University, UKVerified email at acm.org
Sami AlajramiPhD researcher, Newcastle UniversityVerified email at ncl.ac.uk
Ehsan Toreini
Department of Computer Science, Durham University
Verified email at durham.ac.uk - Homepage