Get my own profile
Public access
View all14 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Stelios SotiriadisBirkbeck, University of LondonVerified email at dcs.bbk.ac.uk
S. ToralUniversidad de SevillaVerified email at us.es
Marcello TrovatiEdge Hill UniversityVerified email at edgehill.ac.uk
Federico BarreroElectronic Engineering Department, Universidad de Sevilla (University of Seville), SpainVerified email at us.es
Leonard BarolliProfessor, Fukuoka Institute of TechnologyVerified email at fit.ac.jp
Daniel Gutiérrez ReinaUniversidad de SevillaVerified email at us.es
Valentin CristeaUniversity Politehnica of BucharestVerified email at cs.pub.ro
Ciprian DobreUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Florin V. PopUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Zhihua LaiMicrosoft ResearchVerified email at microsoft.com
Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
Timothy FrenchTeaching Fellow Cyber Bath UniversityVerified email at bath.ac.uk
Yong YueXi'an Jiaotong-liverpool UniversityVerified email at xjtlu.edu.cn
Navonil MustafeeProfessor, University of Exeter Business School, University of ExeterVerified email at exeter.ac.uk
Professor Kevin CurranProfessor in Cyber Security at Ulster UniversityVerified email at ulster.ac.uk
Asta ZelenkauskaiteAssociate Professor of Communication, Drexel UniversityVerified email at drexel.edu
Evangelos PournarasUKRI Future Leaders Fellow, Associate Professor, School of Computing, University of LeedsVerified email at leeds.ac.uk
Dirk HelbingComputational Social Science, ETH ZurichVerified email at ethz.ch
Dr Eleana AsimakopoulouVisiting Researcher, University of Derby, UK
Follow
Nik Bessis
Professor of Computer Science, Senior Advisor to PVC (Research), Edge Hill University, UK
Verified email at edgehill.ac.uk - Homepage