Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
Paul Haskell-DowlandEdith Cowan UniversityVerified email at ecu.edu.au
Andy PhippenBournemouth universityVerified email at bournemouth.ac.uk
Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKVerified email at bournemouth.ac.uk
Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteVerified email at met.no
Nor Badrul AnuarProfessor of Network and Cybersecurity, University of MalayaVerified email at um.edu.my
Dr. Nader Sohrabi safaManchester Metropolitan UniversityVerified email at mmu.ac.uk
Weizhi MengDepartment of Applied Mathematics and Computer Science, Technical University of DenmarkVerified email at dtu.dk
Rossouw Von SolmsNelson Mandela UniversityVerified email at nmmu.ac.za
Bogdan GhitaUniversity of PlymouthVerified email at plymouth.ac.uk
Christoph ReichProfessor of Computer ScienceVerified email at hs-furtwangen.de
Phil BrookeGreen Pike LtdVerified email at green-pike.co.uk
shukor razakUniversiti teknologi malaysiaVerified email at utm.my
Ismini VasileiouAssociate Professor | Director of the East Midlands Cyber Security ClusterVerified email at dmu.ac.uk
Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
Sokratis K. KatsikasProfessor, Dept. of Information Security and Communication Technology, NTNUVerified email at ntnu.no
Kerry-Lynn ThomsonNelson Mandela UniversityVerified email at mandela.ac.za
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg