Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Konstantinos MarkantonakisProfessor of Information SecurityVerified email at rhul.ac.uk
Keith MayesRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Damien SauveronAssociate Professor with Habilitation in Computer Science, University of LimogesVerified email at unilim.fr
Iakovos GurulianTEKA Systems S.A.Verified email at teka.vionet.gr
Carlton ShepherdLecturer (~Assistant Professor), Newcastle University, UKVerified email at ncl.ac.uk
Benjamin SemalInformation Security Group, Royal Holloway University of LondonVerified email at live.rhul.ac.uk
Freya Sheer HardwickStudent at Royal Holloway, University Of LondonVerified email at live.rhul.ac.uk
HAFIZAH MANSORInternational Islamic University MalaysiaVerified email at iium.edu.my
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Eibe FrankProfessor, Department of Computer Science, University of WaikatoVerified email at cs.waikato.ac.nz
Emmanuel ConchonAssistant professor, University of Limoges, XLIMVerified email at unilim.fr
Jan KalbantnerRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
James TapsellStudent, Royal Holloway, University of LondonVerified email at rhul.ac.uk
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Manos PanaousisProfessor of Cyber Security, Internet of Things and Security Centre, University of GreenwichVerified email at greenwich.ac.uk
Robert Caddell AtkinsonUniversity of StrathclydeVerified email at strath.ac.uk
Maryline LaurentTelecom SudParisVerified email at telecom-sudparis.eu
Assad UmarPhD candidate at Royal Holloway, University of LondonVerified email at live.rhul.ac.uk
Follow
Raja Naeem Akram
Department of Computer Science, University of Aberdeen
Verified email at abdn.ac.uk - Homepage