Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
- Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
- Mohiuddin AhmedSenior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior MemberVerified email at ecu.edu.au
- Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
- James KangEdith Cowan University WA, AustraliaVerified email at ecu.edu.au
- Leslie F. SikosEdith Cowan UniversityVerified email at ecu.edu.au
- MZ JaliAssociate Professor, Universiti Sains Islam Malaysia (USIM)Verified email at usim.edu.my
- ZARUL FITRI ZAABAUniversiti Sains MalaysiaVerified email at usm.my
- Wencheng YangUniversity of Southern QueenslandVerified email at usq.edu.au
- Nickson M. KarieSenior Lecturer-Cybersecurity and Forensics, Curtin University, Australia.Verified email at curtin.edu.au
- Nor Masri SAHRIUniversity Technology MARA MalaysiaVerified email at kyudai.jp
- Bogdan GhitaUniversity of PlymouthVerified email at plymouth.ac.uk
- Burhan Al-bayati.Lecturer, Computer Science Department, College of Science, Diyala University, IraqVerified email at sciences.uodiyala.edu.iq
- Luigi VezzulliUniversity of GenoaVerified email at unige.it
- Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteVerified email at met.no
- Najem MahmoudPhD, University of Plymouth, UK.Verified email at plymouth.ac.uk