Get my own profile
Public access
View all9 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Panagiotis KatsarosProfessor of Computer Science, Aristotle University of Thessaloniki, GreeceVerified email at csd.auth.gr
Peter Gorm LarsenAarhus UniversityVerified email at ece.au.dk
Sophia PetridouDepartment of Applied Informatics, University of MacedoniaVerified email at uom.edu.gr
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Nikolaos AlexiouSecurity SpecialistVerified email at kth.se
Jim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
Carl GambleResearch Associate, Newcastle UniversityVerified email at newcastle.ac.uk
Andrey SadovykhSofteamVerified email at softeam.fr
Thierry LecomteClearSy Systems EngineeringVerified email at clearsy.com
Richard PayneSenior Software Engineer, Asset55Verified email at assetfiftyfive.com
Tarik HadzicMachine Learning, MetaVerified email at meta.com
Scott A. SmolkaProfessor of Computer Science, Stony Brook UniversityVerified email at cs.sunysb.edu
Tushar DeshpandeStony Brook UniversityVerified email at cs.stonybrook.edu
Stavros TripakisAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
Peter FritzsonProfessor of Computer Science, Linköping UniversityVerified email at liu.se
Ole GreenProfessorVerified email at agrointelli.com
Alessandra BagnatoSofteam R&DVerified email at softeam.fr
Casper ThulePostDoc, Aarhus University, Department of Engineering, DIGITVerified email at eng.au.dk
Yannis SoupionisJoint Research Center, European CommissionVerified email at ec.europa.eu
Dimitris A. GritzalisProfessor of Cybersecurity, Athens University of Economics & BusinessVerified email at aueb.gr
Follow
Stylianos (Stelios) Basagiannis
Group Leader, Raytheon Technologies Research Centre;
Verified email at collins.com