Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Tim KellyProfessor of High Integrity SystemsVerified email at york.ac.uk
- Andrew RaeAssociate Professor, Griffith UniversityVerified email at griffith.edu.au
- John McDermidUniversity of YorkVerified email at york.ac.uk
- Richard HawkinsSenior Research Fellow, Department of Computer Science, The University of YorkVerified email at cs.york.ac.uk
- John A. ClarkProfessor of Computer and Information Security, University of SheffieldVerified email at sheffield.ac.uk
- Jonathan M. AitkenUniversity of SheffieldVerified email at sheffield.ac.uk
- Kester CleggResearch AssociateVerified email at cs.york.ac.uk
- Ibrahim HabliProfessor of Safety-Critical Systems at the University of YorkVerified email at york.ac.uk
- Victoria HodgeUniversity of York, UKVerified email at york.ac.uk
- Xueyi ZouHuawei Noah's Ark LabVerified email at huawei.com
- Manuel OriolConstructor Institute SchaffhausenVerified email at constructor.org
- Matthew PatrickDepartment of Dermatology, University of MichiganVerified email at umich.edu
- Catherine MenonUniversity of HertfordshireVerified email at imperial.ac.uk
- zaid tahirPhD Researcher at ECE dept Boston UniversityVerified email at bu.edu
- Mark NicholsonVerified email at york.ac.uk
- Mario GleirscherIndependent ResearcherVerified email at tum.de
- James A. DouthwaitePost-Doctoral Scientist, University Of SheffieldVerified email at sheffield.ac.uk
- Radu CalinescuProfessor of Computer Science, University of YorkVerified email at york.ac.uk
- James LawThe University of SheffieldVerified email at sheffield.ac.uk
- Teodor GhetiuUniversity of SibiuVerified email at ulbsibiu.ro