Get my own profile
Public access
View all14 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Stelios SotiriadisBirkbeck, University of LondonVerified email at dcs.bbk.ac.uk
Marcello TrovatiEdge Hill UniversityVerified email at edgehill.ac.uk
S. ToralUniversidad de SevillaVerified email at us.es
Federico BarreroDepartamento de Ingeniería Electrónica, Universidad de Sevilla (University of Seville), SpainVerified email at us.es
Leonard BarolliProfessor, Fukuoka Institute of TechnologyVerified email at fit.ac.jp
Daniel Gutiérrez ReinaUniversidad de SevillaVerified email at us.es
Valentin CristeaUniversity Politehnica of BucharestVerified email at cs.pub.ro
Florin V. PopUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Ciprian DobreUniversity Politehnica of Bucharest; ICI BucharestVerified email at cs.pub.ro
Zhihua LaiMicrosoft ResearchVerified email at microsoft.com
Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
Timothy FrenchTeaching Fellow Cyber Bath UniversityVerified email at bath.ac.uk
Yong YueXi'an Jiaotong-liverpool UniversityVerified email at xjtlu.edu.cn
Navonil (Nav) MustafeeProfessor, University of Exeter Business School, University of ExeterVerified email at exeter.ac.uk
Professor Kevin CurranProfessor in Cyber Security at Ulster UniversityVerified email at ulster.ac.uk
Asta ZelenkauskaiteProfessor of Communication, Drexel UniversityVerified email at drexel.edu
Evangelos PournarasProfessor of Trustworthy Distributed Intelligence, UKRI Future Leaders Fellow, University of LeedsVerified email at leeds.ac.uk
Dirk HelbingComputational Social Science, ETH ZurichVerified email at ethz.ch
Dr Eleana AsimakopoulouIndependent Scientist
Follow
Nik Bessis
Professor of Computer Science, Senior Advisor to PVC (Research), Edge Hill University, UK
Verified email at edgehill.ac.uk - Homepage