Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Dr. Nader Sohrabi safaManchester Metropolitan UniversityVerified email at mmu.ac.uk
- Mohammad TahirUniversity of TurkuVerified email at utu.fi
- Lee Sai PeckProfessor, Faculty of Computer Science and Information Technology, University of MalayaVerified email at um.edu.my
- Dr. Mohsen KakavandLecturer in CybersecurityVerified email at ieee.org
- Mehdi SookhakTexas A&M University-Corpus ChristiVerified email at ieee.org
- Angela AmphawanSunway University, Massachusetts Institute of TechnologyVerified email at sunway.edu.my
- Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
- Charith PereraCardiff University, UKVerified email at acm.org
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Amin BeheshtiFull Professor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
- Dr.Farzad TahririPh.D. in Industrial and System Engineering - Project Manager (UT)Verified email at ut.ac.ir