Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Roel WieringaUniversity of TwenteVerified email at utwente.nl
Dr. Asma AdnaneLecturer, Loughborough UniversityVerified email at lboro.ac.uk
Andrew MarringtonAssociate Professor, Zayed UniversityVerified email at zu.ac.ae
Farhan AhmadUniversity of Huddersfield, UKVerified email at hud.ac.uk
Pascal van EckSoftware Improvement GroupVerified email at pascalvaneck.com
Fatih KurugolluProfessor, University of SharjahVerified email at sharjah.ac.ae
Noora Al MutawaDubai Police - University of Central LancashireVerified email at uclan.ac.uk
Yijun YuThe Open UniversityVerified email at open.ac.uk
Thein Than TunResearch Associate, The Open UniversityVerified email at open.ac.uk
Dr. Muhammad Shahroz Nadeemlecturer in Computing / Cyber Security University of Suffolk, U.K.Verified email at uos.ac.uk
Bashar NuseibehThe Open University (UK) & Lero (Ireland)Verified email at open.ac.uk
Lu LiuUniversity of LeicesterVerified email at leicester.ac.uk
Xiaojun ZhaiUniversity of EssexVerified email at essex.ac.uk
Ralf Luis de MouraProfessor, Pesquisador e Arquiteto Corporativo ValeVerified email at vale.com
Janet C ReadUniversity of Central LancashireVerified email at uclan.ac.uk
Maya DanevaAssociate Professor of Computer Science, University of TwenteVerified email at utwente.nl
Gustavo PessinInstituto Tecnológico ValeVerified email at itv.org
Nelly Condori FernandezUniversidad Santiago de CompostelaVerified email at usc.es
Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
Marian DugganReader in Criminology, University of Kent, CanterburyVerified email at kent.ac.uk