Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Peter PopovReader, City University LondonVerified email at csr.city.ac.uk
- Ilir GashiReader, Centre for Software Reliability, City University LondonVerified email at city.ac.uk
- Robin E BloomfieldCity University and Adelard LLPVerified email at csr.city.ac.uk
- Kizito SalakoCity, University of LondonVerified email at city.ac.uk
- Olivier ThonnardDirector Security Operations, AmadeusVerified email at amadeus.com
- Alysson BessaniLASIGE, Dep. de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at ciencias.ulisboa.pt
- Corrado LeitaLastline Inc.Verified email at lastline.com
- Paulo SousaLetsGetCheckedVerified email at letsgetchecked.com
- Bertrand SobestoSenior IT Security Engineer, University of MarylandVerified email at umd.edu
- Michel CukierAssociate Professor, University of MarylandVerified email at umd.edu
- Stephen James MasonPhD Research Student - City University LondonVerified email at city.ac.uk
- Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at cs.fau.de
- Johan KarlssonProfessor of dependable realtime systemsVerified email at chalmers.se
- Marco VieiraUniversity of North Carolina at Charlotte, University of CoimbraVerified email at uncc.edu
- Henrique MadeiraUniversity of CoimbraVerified email at dei.uc.pt
- Urko Zurutuza OrtegaMondragon Unibertsitatea - Data Analysis & Cybersecurity (ROR 00wvqgd19)Verified email at mondragon.edu
- Katinka WolterProfessor of Computer Science, FU BerlinVerified email at fu-berlin.de
- Robin BerthierUniversity of IllinoisVerified email at illinois.edu