Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Prof. Paul VickersProfessor of Computer Science & Sonification, Northumbria UniversityVerified email at northumbria.ac.uk
- Alan RobinsonSolent University - retiredVerified email at solent.ac.uk
- Dr Kuo-Ming ChaoUniversity of RoehamptonVerified email at roehampton.ac.uk
- Charles MorissetReader in Security, Newcastle UniversityVerified email at ncl.ac.uk
- Iryna YevseyevaDe Montfort University, LeicesterVerified email at dmu.ac.uk
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jeremy EllmanRosen GroupVerified email at rosen-group.com
- Alison PickardReader / Associate Professor in Information Science, Faculty of Engineering and EnvironmentVerified email at unn.ac.uk
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
- Thomas Gloedence GmbHVerified email at tu-dresden.de
- Sue ChildsSenior Research Fellow, iSchool, Faculty of Engineering & Environment, Northumbria UniversityVerified email at northumbria.ac.uk
- Ciara KieransUniversity of LiverpoolVerified email at liverpool.ac.uk