Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
- Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
- Paul Haskell-DowlandEdith Cowan UniversityVerified email at ecu.edu.au
- Andy PhippenBournemouth universityVerified email at bournemouth.ac.uk
- Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
- Weizhi MengDepartment of Applied Mathematics and Computer Science, Technical University of DenmarkVerified email at dtu.dk
- Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
- Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteVerified email at met.no
- Nor Badrul AnuarProfessor of Network and Cybersecurity, University of MalayaVerified email at um.edu.my
- Dr. Nader Sohrabi safaManchester Metropolitan UniversityVerified email at mmu.ac.uk
- Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
- Bogdan GhitaUniversity of PlymouthVerified email at plymouth.ac.uk
- Christoph ReichProfessor of Computer ScienceVerified email at hs-furtwangen.de
- Sokratis K. KatsikasProfessor, Dept. of Information Security and Communication Technology, NTNUVerified email at ntnu.no
- Phil BrookeGreen Pike LtdVerified email at green-pike.co.uk
- shukor razakUniversiti teknologi malaysiaVerified email at utm.my
- Ismini VasileiouAssociate Professor | Director of the East Midlands Cyber Security ClusterVerified email at dmu.ac.uk
- Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
- Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg