Get my own profile
Public access
View all13 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
Stylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
Sofia Anna MenesidouDigital Security & Trusted Computing Group at UBITECH LtdVerified email at ubitech.eu
Neeli PrasadIEEE VTS Board of Governors MemberVerified email at smartavatar.nl
Entso VeliouSecurity Engineer and Researcher at UbitechVerified email at ubitech.eu
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Panagiotis GouvasDrVerified email at ubitech.eu
Dimosthenis KyriazisUniversity of PiraeusVerified email at unipi.gr
Dunja MladenicSenior researcher at J. Stefan InstituteVerified email at ijs.si
Blaz FortunaNordoon; Jozef Stefan InstituteVerified email at blazfortuna.com
Manos PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Heini Bergsson DebesPhD Student, Technical University of Denmark (DTU)Verified email at dtu.dk
John SoldatosProfessor, Honorary Research Fellow, ICT and Business ConsultantVerified email at glasgow.ac.uk
Klemen KendaResearcher at Jozef Stefan Institute, LjubljanaVerified email at ijs.si
Felix FreilingFriedrich-Alexander-Universität Erlangen-Nürnberg (FAU)Verified email at fau.de
Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistVerified email at dtu.dk
Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk
Eleftherios AnastasiadisImperial College LondonVerified email at imperial.ac.uk