Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
- Michele BugliesiProfessor of Computer Science, Universita' Ca' Foscari VeneziaVerified email at unive.it
- Victor Chang (Data Scientist,Industry 5...Professor of Business Analytics, Aston UniversityVerified email at aston.ac.uk
- Lewis GolightlyLecturer in Cybersecurity and Blockchain at Teesside UniversityVerified email at tees.ac.uk
- Omar AlmousaJordan University of Science and TechnologyVerified email at just.edu.jo
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- Leo FreitasSenior Lecturer in Formal Methods and Tools, School of Computing Science, Newcastle University, UKVerified email at newcastle.ac.uk
- Anna KobusińskaInstitute of Computing Science, Poznań University of TechnologyVerified email at cs.put.poznan.pl
- Stefano CalzavaraUniversità Ca' Foscari VeneziaVerified email at unive.it
- Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
- Martin EmmsNewcastle UniversityVerified email at newcastle.ac.uk
- Dr. Lothar FritschProfessor, Oslo Metropolitan University, NorwayVerified email at lotharfritsch.de
- Kovila PL CoopamootooKing's College LondonVerified email at kcl.ac.uk
- Meiko JensenSenior Lecturer for Cybersecurity at Karlstad University, SwedenVerified email at kau.se
- Patrick McCorryCrypto enthusiast
Follow
Paolo Modesti
Senior Lecturer in Cybersecurity, Teesside University, UK, Europe
Verified email at tees.ac.uk - Homepage