Get my own profile
Public access
View all3 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Dinesh VermaIBMVerified email at us.ibm.com
Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
Dave BrainesIBM Research, UKVerified email at uk.ibm.com
Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
Greg CirincioneARLVerified email at mail.mil
Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
Mario Gómez MartínezAssociate Professor (UPV)Verified email at dsic.upv.es
Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Verified email at sci.brooklyn.cuny.edu
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Christopher GibsonIBM Research, IBM UKVerified email at uk.ibm.com
Diane FelmleeProfessor of Sociology, Pennsylvania UniversityVerified email at psu.edu
Derek SleemanProfessor of Computing Science, The University, Aberdeen, UKVerified email at abdn.ac.uk
Alice TonioloUniversity of St AndrewsVerified email at st-andrews.ac.uk
Nir OrenProfessor at the University of AberdeenVerified email at abdn.ac.uk