Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Richard HillProfessor of Intelligent Systems, University of HuddersfieldVerified email at hud.ac.uk
- Tariq Alsboui, PhD, FHEALecturer in Computing, University of HuddersfieldVerified email at hud.ac.uk
- Lu LiuUniversity of LeicesterVerified email at leicester.ac.uk
- Nick AntonopoulosEdinburgh Napier UniversityVerified email at napier.ac.uk
- Phil LaneProfessor of Communications Systems Engineering, University of HuddersfieldVerified email at hud.ac.uk
- Anju JohnsonSenior Lecturer, University of HuddersfieldVerified email at hud.ac.uk
- Shamaila IramUniversity of HuddersfieldVerified email at hud.ac.uk
- Jianxin LiSchool of Computer Science & Engineering, Beihang UniversityVerified email at act.buaa.edu.cn
- Hafiz Muhammad ShakeelUniversity of HuddersfieldVerified email at hud.ac.uk
- Benjamin AgboResearcher in Computer Science and Informatics, University of HuddersfieldVerified email at hud.ac.uk
- Simon ParkinsonProfessor, University of Huddersfield & UK Government Cyber Security Advisory Board MemberVerified email at hud.ac.uk
- Mohammad Sh.DaoudAl Ain UniversityVerified email at aau.ac.ae
- Mohammed Q. ShatnawiJordan University of Science and TechnologyVerified email at just.edu.jo
- Ahmad Mansour M. ManasrahHigher Colleges of Technology, Sharjah Women Campus, Sharjah, UAEVerified email at hct.ac.ae
- Muhammad HussainLecturer in Computer Science, University of HuddersfieldVerified email at hud.ac.uk
Follow
Hussain Al-Aqrabi, PhD
MSc PGCHE FHEA IEEE CEH AWSE MCE MCITP MCSE CCNA Higher Colleges of Technology (UAE)
Verified email at hct.ac.ae