Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Elisavet KonstantinouAssistant Professor, Dep. of Information & Communication Systems Engineering, Univ. of the AegeanVerified email at aegean.gr
Marios AnagnostopoulosAssistant Professor, Aalborg UniversityVerified email at es.aau.dk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Chloe MartindalePostdoc, Eindhoven University of TechnologyVerified email at tue.nl
Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
Anastasia DoumaDepartment of Information & Communication Systems Engineering, University of the AegeanVerified email at aegean.gr
Peter Browne RønneResearcherVerified email at nbi.dk
Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Hao ChengPh.D. Student, University of LuxembourgVerified email at uni.lu
Mónica P. ArenasUniverity of LuxembourgVerified email at uni.lu
Muhammed Ali BingolSenior Lecturer in Cyber Security at De Montfort UniversityVerified email at dmu.ac.uk
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Hüseyin DemirciUniversity of LuxembourgVerified email at uni.lu