Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Manos PanaousisProfessor of Cyber Security, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
- Christos XenakisProfessor, Department of Digital Systems, University of PiraeusVerified email at unipi.gr
- George LoukasHead, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at gre.ac.uk
- Aristeidis FaraoUniversity of PiraeusVerified email at ssl-unipi.gr
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
- Stefan RassFull Professor, LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, AustriaVerified email at jku.at
- Christos LaoudiasResearch Lecturer, KIOS Research and Innovation Center of Excellence, University of CyprusVerified email at ucy.ac.cy
- Ian OliverNokia Bell LabsVerified email at nokia-bell-labs.com
- Sotiris MoschoyiannisUniversity of SurreyVerified email at surrey.ac.uk
- Daniel W. WoodsUniversity of Edinburgh & British University in DubaiVerified email at ed.ac.uk
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Michail ChronopoulosSenior Lecturer at City, University of London
Follow
Sakshyam Panda
Centre for Sustainable Cyber Security (CS2), University of Greenwich
Verified email at greenwich.ac.uk - Homepage