Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
- Chris NovakovicDepartment of Computing, Imperial College LondonVerified email at imperial.ac.uk
- Indranath ChatterjeeAssistant Professor at Manchester Metropolitan University, UKVerified email at cs.du.ac.in
- Ajay KumarAssistant professor, Computer Science, Central University of Himachal, DharamshalaVerified email at cuhimachal.ac.in
- Rami BahsoonReader, School of Computer Science, University of Birmingham, UK. EiC: ACM TAASVerified email at cs.bham.ac.uk
- Jie XuChair Professor, University of LeedsVerified email at leeds.ac.uk
- Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
- Renyu YangAssociate Professor, Beihang University; formerly, University of LeedsVerified email at leeds.ac.uk
- Satish KumarLeeds Beckett University, UKVerified email at leedsbeckett.ac.uk
Follow
Rajiv Ranjan Singh
Lecturer in Cyber Security at Glasgow Caledonian University
Verified email at gcu.ac.uk - Homepage