Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Konstantinos MarkantonakisProfessor of Information SecurityVerified email at rhul.ac.uk
Keith MayesRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Damien SauveronProfessor in Computer Science, University of LimogesVerified email at unilim.fr
Iakovos GurulianTEKA Systems S.A.Verified email at tekasystems.com
Carlton ShepherdNewcastle University, UKVerified email at ncl.ac.uk
HAFIZAH MANSORInternational Islamic University MalaysiaVerified email at iium.edu.my
Benjamin SemalInformation Security Group, Royal Holloway University of LondonVerified email at live.rhul.ac.uk
Freya Sheer HardwickStudent at Royal Holloway, University Of LondonVerified email at live.rhul.ac.uk
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Eibe FrankProfessor, Department of Computer Science, University of WaikatoVerified email at cs.waikato.ac.nz
Emmanuel ConchonAssistant professor, University of Limoges, XLIMVerified email at unilim.fr
Jan KalbantnerRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
James TapsellStudent, Royal Holloway, University of LondonVerified email at rhul.ac.uk
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Manos PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
Robert Caddell AtkinsonUniversity of StrathclydeVerified email at strath.ac.uk
Maryline LaurentTelecom SudParisVerified email at telecom-sudparis.eu
Assad UmarPhD candidate at Royal Holloway, University of LondonVerified email at live.rhul.ac.uk
Follow
Raja Naeem Akram
Department of Computer Science, University of Aberdeen
Verified email at abdn.ac.uk - Homepage