Get my own profile
Public access
View all15 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
Stylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
Sofia Anna MenesidouDigital Security & Trusted Computing Group at UBITECH LtdVerified email at ubitech.eu
Neeli PrasadIEEE VTS Board of Governors MemberVerified email at smartavatar.nl
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Entso VeliouSecurity Engineer and Researcher at UbitechVerified email at ubitech.eu
Panagiotis GouvasDrVerified email at ubitech.eu
Manos PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
Dimosthenis KyriazisUniversity of PiraeusVerified email at unipi.gr
Dunja MladenicSenior researcher at J. Stefan InstituteVerified email at ijs.si
Blaz FortunaExtrakt.AI; Jozef Stefan InstituteVerified email at blazfortuna.com
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Heini Bergsson DebesPhD Student, Technical University of Denmark (DTU)Verified email at dtu.dk
John SoldatosProfessor, Honorary Research Fellow, ICT and Business ConsultantVerified email at glasgow.ac.uk
Klemen KendaResearcher at Jozef Stefan Institute, LjubljanaVerified email at ijs.si
Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistVerified email at dtu.dk
Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk
Eleftherios AnastasiadisImperial College LondonVerified email at imperial.ac.uk
George LoukasHead, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at gre.ac.uk