Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Christoph SchmittnerScientist, AIT Austrian Instituit of TechnologyVerified email at ait.ac.at
- Ani BicakuLulea University of Technology, EISLABVerified email at ltu.se
- Silia MaksutiResearcher, University of Applied Sciences Burgenland, Lulea University of Technology, EISLABVerified email at fh-burgenland.at
- Jerker DelsingProfessor Luleå University of Technology, EISLABVerified email at ltu.se
- Igor IvkicLancaster University, UKVerified email at lancaster.ac.uk
- Andreas MautheProfessor IT & Data Security, University Koblenz-LandauVerified email at uni-koblenz.de
- Saleem BhattiUniversity of St AndrewsVerified email at st-andrews.ac.uk
- Sándor PlószResearcher, Heriot-Watt UniversityVerified email at tmit.bme.hu
- Alireza EsfahaniLecturer in Cyber Security at University of West LondonVerified email at uwl.ac.uk
- Firooz Bashashi SaghezchiRWTH Aachen UniversityVerified email at dsp.rwth-aachen.de
- David HutchisonEmeritus Professor, Lancaster UniversityVerified email at lancaster.ac.uk
- Alan DearleUniversity of St AndrewsVerified email at st-andrews.ac.uk
- Graham KirbyProfessor of Computer Science, University of St AndrewsVerified email at st-andrews.ac.uk
- Yi YuUniversity of St AndrewsVerified email at st-andrews.ac.uk
- Frank PallasProfessor for Privacy Engineering and Policy-Aligned Systems, Paris Lodron University of SalzburgVerified email at plus.ac.at
- Alexander WöhrerLecturer, University of Applied Sciences BurgenlandVerified email at fh-burgenland.at
- Nuno PereiraSchool of Engineering of the Polytechnic of Porto (ISEP/IPP)Verified email at isep.ipp.pt
- Arsham FarshadBritish TelecomVerified email at bt.com