Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
Mohiuddin AhmedSenior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior MemberVerified email at ecu.edu.au
Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
James KangEdith Cowan University WA, AustraliaVerified email at ecu.edu.au
Leslie F. SikosEdith Cowan UniversityVerified email at ecu.edu.au
MZ JaliAssociate Professor, Universiti Sains Islam Malaysia (USIM)Verified email at usim.edu.my
ZARUL FITRI ZAABAUniversiti Sains MalaysiaVerified email at usm.my
Wencheng YangUniversity of Southern QueenslandVerified email at usq.edu.au
Nickson M. KarieSenior Lecturer-Cybersecurity and Forensics, Curtin University, Australia.Verified email at curtin.edu.au
Nor Masri SAHRIUniversity Technology MARA MalaysiaVerified email at kyudai.jp
Burhan Al-bayati.Lecturer, Computer Science Department, College of Science, Diyala University, IraqVerified email at sciences.uodiyala.edu.iq
Bogdan GhitaUniversity of PlymouthVerified email at plymouth.ac.uk
Luigi VezzulliUniversity of GenoaVerified email at unige.it
Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteVerified email at met.no
Najem MahmoudPhD, University of Plymouth, UK.Verified email at plymouth.ac.uk