Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
Paul Haskell-DowlandEdith Cowan UniversityVerified email at ecu.edu.au
Andy PhippenBournemouth universityVerified email at bournemouth.ac.uk
Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
Weizhi MengProfessor, Lancaster University, United KingdomVerified email at lancaster.ac.uk
Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteVerified email at met.no
Nor Badrul AnuarProfessor of Network and Cybersecurity, University of MalayaVerified email at um.edu.my
Dr. Nader Sohrabi safaUniversity of WolverhamptonVerified email at warwick.ac.uk
Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
Bogdan GhitaUniversity of PlymouthVerified email at plymouth.ac.uk
Christoph ReichProfessor of Computer ScienceVerified email at hs-furtwangen.de
Phil BrookeGreen Pike LtdVerified email at green-pike.co.uk
shukor razakUniversiti teknologi malaysiaVerified email at utm.my
Ismini VasileiouAssociate Professor | Director of the East Midlands Cyber Security ClusterVerified email at dmu.ac.uk
Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
Sokratis K. KatsikasProfessor, Dept. of Information Security and Communication Technology, NTNUVerified email at ntnu.no
Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg