Get my own profile
Public access
View all8 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Panagiotis KatsarosAssociate Professor of Computer Science, Aristotle University of Thessaloniki, GreeceVerified email at csd.auth.gr
Peter Gorm LarsenAarhus UniversityVerified email at ece.au.dk
Sophia PetridouDepartment of Applied Informatics, University of MacedoniaVerified email at uom.edu.gr
Nikolaos AlexiouSecurity SpecialistVerified email at kth.se
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
Andrey SadovykhSofteamVerified email at softeam.fr
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Jim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
Thierry LecomteClearSy Systems EngineeringVerified email at clearsy.com
Richard PayneSenior Software Engineer, Asset55Verified email at assetfiftyfive.com
Scott A. SmolkaProfessor of Computer Science, Stony Brook UniversityVerified email at cs.sunysb.edu
Tushar DeshpandeStony Brook UniversityVerified email at cs.stonybrook.edu
Alessandra BagnatoSofteam R&DVerified email at softeam.fr
Casper ThulePostDoc, Aarhus University, Department of Engineering, DIGITVerified email at eng.au.dk
Tarik HadzicMachine Learning, MetaVerified email at meta.com
Stavros TripakisAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
Peter FritzsonProfessor of Computer Science, Linköping UniversityVerified email at liu.se
Ole GreenProfessorVerified email at agrointelli.com
Yannis SoupionisJoint Research Center, European CommissionVerified email at ec.europa.eu
Dimitris A. GritzalisProfessor of Cybersecurity, Athens University of Economics & BusinessVerified email at aueb.gr
Follow
Stylianos (Stelios) Basagiannis
Group Leader, Raytheon Technologies Research Centre;
Verified email at collins.com