Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ahmad S. El AhmadPhD Computer Science, Newcastle UniversityVerified email at ncl.ac.uk
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Bin ZhuMicrosoft Research AsiaVerified email at microsoft.com
Alan BlackwellProfessor of Interdisciplinary Design, University of CambridgeVerified email at cam.ac.uk
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Jussi PalomäkiPh.D, Docent (Cognitive Science). Senior Researcher, Finnish Institute of Health and WelfareVerified email at helsinki.fi
Utz RoedigProfessor, University College CorkVerified email at cs.ucc.ie
Ibrahim Ethem BagciNetwork Threat Analyst & Detection Engineer at VMware, Inc.Verified email at vmware.com
Peng ChengPostdoctoral researcher of Zhejiang UniversityVerified email at zju.edu.cn
Ilia ShumailovJRF Christ Church, University of Oxford; PhD, University of Cambridge; Fellow, Vector InstituteVerified email at cl.cam.ac.uk
David ModicCambridge UniversityVerified email at cl.cam.ac.uk
Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
Aurélien BourquardPostdoctoral Fellow, MIT LinQVerified email at mit.edu
Dan CiresanConndera ResearchVerified email at conndera.com
Peter RobinsonProfessor of Computer Technology, University of CambridgeVerified email at cam.ac.uk