Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
Paul Haskell-DowlandEdith Cowan UniversityVerified email at ecu.edu.au
Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
Andy PhippenBournemouth universityVerified email at bournemouth.ac.uk
Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteVerified email at met.no
Nor Badrul AnuarProfessor of Network and Cybersecurity, University of MalayaVerified email at um.edu.my
Dr. Nader Sohrabi safaUniversity of WolverhamptonVerified email at wlv.ac.uk
Weizhi MengDepartment of Applied Mathematics and Computer Science, Technical University of DenmarkVerified email at dtu.dk
Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
Bogdan GhitaUniversity of PlymouthVerified email at plymouth.ac.uk
Christoph ReichProfessor of Computer ScienceVerified email at hs-furtwangen.de
Phil BrookeGreen Pike LtdVerified email at green-pike.co.uk
shukor razakUniversiti teknologi malaysiaVerified email at utm.my
Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
Ismini VasileiouAssociate Professor in Information Systems|Associate Head of School|Strategic Leader in DigitalVerified email at dmu.ac.uk
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Sokratis K. KatsikasProfessor, Dept. of Information Security and Communication Technology, NTNUVerified email at ntnu.no