Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Steve LoveBrunel UniversityVerified email at brunel.ac.uk
Awanthika SenarathAustralian Centre for Cyber Security, University of new South Wales CanebrraVerified email at student.adfa.edu.au
Chamila WijayarathnaSoftware Engineer, Macquarie GroupVerified email at latrobe.edu.au
Mumtaz Abdul HameedTechnovation Consulting and Training Private LimitedVerified email at brunel.ac.uk
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca
Nicholas MicallefPostdoctoral Researcher, New York University Abu DhabiVerified email at nyu.edu
Marthie GroblerPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Michael "Adrir" ScottHead of Computing and Associate Professor of Computer Science Education, Falmouth UniversityVerified email at falmouth.ac.uk
Ildar MuslukhovThe University of British ColumbiaVerified email at ece.ubc.ca
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Abdulrahman AlhazmiLecturer, Jazan UniversityVerified email at jazanu.edu.sa
Lennart E. NackeAssociate Professor, HCI Games and UX Research, University of WaterlooVerified email at uwaterloo.ca
George E. RaptisHuman Opsis / Industrial Systems Institute, ATHENA RC / University of PatrasVerified email at humanopsis.com
Christina KatsiniHuman Opsis / Industrial Systems InstituteVerified email at bath.edu
Shlomo BerkovskyMacquarie UniversityVerified email at mq.edu.au
Gaurav MisraData Scientist, SkyscannerVerified email at skyscanner.net
James NicholsonSenior Lecturer, Northumbria UniversityVerified email at northumbria.ac.uk
Matt DixonNorthumbria UniversityVerified email at northumbria.ac.uk
Ivan FlechaisUniversity of OxfordVerified email at cs.ox.ac.uk
Jose SuchResearch Professor, King's College London & Professor Titular VRAIN-UPVVerified email at kcl.ac.uk