Get my own profile
Public access
View all8 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Stelios SotiriadisBirkbeck, University of LondonVerified email at dcs.bbk.ac.uk
S. ToralUniversidad de SevillaVerified email at us.es
Federico BarreroElectronic Engineering Department, Universidad de Sevilla (University of Seville), SpainVerified email at us.es
Daniel Gutiérrez ReinaUniversidad de SevillaVerified email at us.es
Marcello TrovatiEdge Hill UniversityVerified email at edgehill.ac.uk
Ciprian DobreUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Valentin CristeaUniversity Politehnica of BucharestVerified email at cs.pub.ro
Florin V. PopUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Rajkumar BuyyaCLOUDS Lab, School of Computing and Information Systems, The University of Melbourne, AustraliaVerified email at unimelb.edu.au
Asta ZelenkauskaiteAssociate Professor of Communication, Drexel UniversityVerified email at drexel.edu
Evangelos PournarasAssociate Professor, School of Computing, University of LeedsVerified email at leeds.ac.uk
Professor Kevin CurranProfessor in Cyber Security at Ulster UniversityVerified email at ulster.ac.uk
Dirk HelbingComputational Social Science, ETH Zurich, Delft University of TechnologyVerified email at ethz.ch
Dr Eleana AsimakopoulouVisiting Researcher, University of Derby, UK
Nik Bessis
Professor and Head (Chair) of Department of Computer Science, Edge Hill University, UK
Verified email at edgehill.ac.uk - Homepage