Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jamie LorimerProfessor of Environmental Geography, University of OxfordVerified email at ouce.ox.ac.uk
- Richard GrenyerUniversity of OxfordVerified email at ouce.ox.ac.uk
- Timothy HodgettsDepartmental Lecturer, University of OxfordVerified email at ouce.ox.ac.uk
- Awais RashidProfessor, Department of Computer Science, University of Bristol, UKVerified email at bristol.ac.uk
- Joseph HallettUniversity of BristolVerified email at bristol.ac.uk
- Tim StevensReader in International Security, Department of War Studies, King's College LondonVerified email at kcl.ac.uk
- Joe DevannyLecturer, King's College LondonVerified email at kcl.ac.uk
- Ola (Aleksandra) MichalecSenior Research Associate, University of BristolVerified email at bristol.ac.uk
- Barnaby CraggsBristol Cyber Security Group, University of BristolVerified email at bristol.ac.uk
- colin toppingUniversity of BristolVerified email at bristol.ac.uk
- Myriam Dunn CaveltyCenter for Security Studies, ETH ZurichVerified email at sipo.gess.ethz.ch
- Lilly Pijnenburg MullerResearch Fellow, Secuirty and Defence Group, Norwegian Institute of International Affairs (NUPI)Verified email at nupi.no
- Chris ElsdenChancellor's Fellow, University of EdinburghVerified email at ed.ac.uk
- David ChattingNewcastle UniversityVerified email at davidchatting.com
- Mike DugganKing's College LondonVerified email at kcl.ac.uk
- Louise AmooreProfessor of Political Geography, Durham UniversityVerified email at dur.ac.uk
- Emily GilbertUniversity of TorontoVerified email at utoronto.ca
- Claudia PeersmanResearch Fellow, University of BristolVerified email at bristol.ac.uk
- Brittany I. DavidsonAssociate Professor; University of BathVerified email at bath.ac.uk
- Matthew EdwardsUniversity of BristolVerified email at bristol.ac.uk
Follow
Andrew Dwyer
Lecturer in Information Security | Royal Holloway, University of London
Verified email at rhul.ac.uk - Homepage