Get my own profile
Public access
View all8 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Panagiotis KatsarosAssociate Professor of Computer Science, Aristotle University of Thessaloniki, GreeceVerified email at csd.auth.gr
Peter Gorm LarsenAarhus UniversityVerified email at ece.au.dk
Sophia PetridouDepartment of Applied Informatics, University of MacedoniaVerified email at uom.edu.gr
Nikolaos AlexiouSecurity SpecialistVerified email at kth.se
Andrey SadovykhSofteamVerified email at softeam.fr
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Jim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
Thierry LecomteClearSy Systems EngineeringVerified email at clearsy.com
Richard PayneSenior Software Engineer, Asset55Verified email at assetfiftyfive.com
Tushar DeshpandeStony Brook UniversityVerified email at cs.stonybrook.edu
Alessandra BagnatoSofteam R&DVerified email at softeam.fr
Scott A. SmolkaProfessor of Computer Science, Stony Brook UniversityVerified email at cs.sunysb.edu
Casper ThulePostDoc, Aarhus University, Department of Engineering, DIGITVerified email at eng.au.dk
Peter FritzsonProfessor of Computer Science, Linköping UniversityVerified email at liu.se
Ole GreenProfessorVerified email at agrointelli.com
Stavros TripakisAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
Yannis SoupionisJoint Research Center, European CommissionVerified email at ec.europa.eu
Dimitris A. GritzalisProfessor of Cybersecurity, Athens University of Economics & BusinessVerified email at aueb.gr
Tarik HadzicSenior AI Lead, AI Labs, Blue PrismVerified email at blueprism.com