Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ahmad S. El AhmadPhD Computer Science, Newcastle UniversityVerified email at ncl.ac.uk
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Bin ZhuMicrosoft Research AsiaVerified email at microsoft.com
Alan BlackwellProfessor of Interdisciplinary Design, University of CambridgeVerified email at cam.ac.uk
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Jussi PalomäkiPh.D, Docent (Cognitive Science). Senior Researcher, Finnish Institute for Health and WelfareVerified email at helsinki.fi
Utz RoedigProfessor, University College CorkVerified email at cs.ucc.ie
Ibrahim Ethem BagciNetwork Threat Analyst & Detection Engineer at VMware, Inc.Verified email at vmware.com
Peng ChengZhejiang UniversityVerified email at zju.edu.cn
Ilia ShumailovGoogle DeepMindVerified email at google.com
Aurélien BourquardPostdoctoral Fellow, MIT LinQVerified email at mit.edu
David ModicCambridge UniversityVerified email at cl.cam.ac.uk
Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
Dan CiresanConndera ResearchVerified email at conndera.com
Peter RobinsonProfessor of Computer Technology, University of CambridgeVerified email at cam.ac.uk