Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
Robert Caddell AtkinsonUniversity of StrathclydeVerified email at strath.ac.uk
Christos TachtatzisUniversity of StrathclydeVerified email at strath.ac.uk
Hanan HindyComputer Science Department, Faculty of Computer and Information Sciences, Ain Shams UniversityVerified email at cis.asu.edu.eg
Amar SeeamCentre for African Smart Public Value Governance (C4SP)Verified email at c4sp.org
Miroslav BuresCzech Technical University In PragueVerified email at fel.cvut.cz
Ethan BayneAudit ScotlandVerified email at audit-scotland.gov.uk
Andrew HamiltonUniversity of GlasgowVerified email at glasgow.ac.uk
David BROSSETFrench naval academy research institute, Arts et Métiers Science & Technology, Naval cyberdefenceVerified email at ecole-navale.fr
Ivan AndonovicUniversity of StrathclydeVerified email at strath.ac.uk
Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk
Elike HodoPhD student, University of StrathclydeVerified email at rmu.edu.gh
Mohamed Ben FarahSenior Lecturer in Cyber Security, Birmingham City UniversityVerified email at bcu.ac.uk
Lynsay A. ShepherdReader, Abertay UniversityVerified email at abertay.ac.uk
Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
Ephraim IorkyasePhD in Application of Machine Learning, University of Strathclyde, UKVerified email at strath.ac.uk
Bestoun S. AhmedProfessor in Computer Science, Karlstad UniversityVerified email at kau.se
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
Preetila SeeamUniversity of MauritiusVerified email at uom.ac.mu
Craig MichieProfessor, University of StrathclydeVerified email at strath.ac.uk
Shivanand GunessUniversity of KentVerified email at kent.ac.uk