Get my own profile
Public access
View all14 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
- Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
- Stylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
- Dimitrios PapamartzivanosDigital Security & Trusted Computing Group at UBITECH LtdVerified email at aegean.gr
- Sofia Anna MenesidouDigital Security & Trusted Computing Group at UBITECH LtdVerified email at ubitech.eu
- Neeli PrasadIEEE VTS Board of Governors MemberVerified email at smartavatar.nl
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Panagiotis GouvasDrVerified email at ubitech.eu
- Entso VeliouSecurity Engineer and Researcher at UbitechVerified email at ubitech.eu
- Manos PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Dimosthenis KyriazisUniversity of PiraeusVerified email at unipi.gr
- Dunja MladenicSenior researcher at J. Stefan InstituteVerified email at ijs.si
- Blaz FortunaExtrakt.AI; Jozef Stefan InstituteVerified email at blazfortuna.com
- Heini Bergsson DebesPhD Student, Technical University of Denmark (DTU)Verified email at dtu.dk
- John SoldatosProfessor, Honorary Research Fellow, ICT and Business ConsultantVerified email at glasgow.ac.uk
- Klemen KendaResearcher at Jozef Stefan Institute, LjubljanaVerified email at ijs.si
- Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistVerified email at dtu.dk
- Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk
- Eleftherios AnastasiadisImperial College LondonVerified email at imperial.ac.uk