Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Natasha AlechinaOpen University NLVerified email at uu.nl
- Hoang Nga NguyenAssociate Professor, Swansea UniversityVerified email at swansea.ac.uk
- Brian LoganNottingham UniversityVerified email at cs.nott.ac.uk
- Hafiz Mahfooz Ul HaqueAssociate Professor, Faculty of Information Technology, University of Central PunjabVerified email at ucp.edu.pk
- Abba LawanFederal University Dutse, NigeriaVerified email at fud.edu.ng
- Rokan Uddin FaruquiAssociate Professor of Computer Science and Engineering, University of ChittagongVerified email at cu.ac.bd
- Phan Cong VinhNguyen Tat Thanh University, VietnamVerified email at ntt.edu.vn
- Asha Sajeewani KarunaratneFaculty of Agricultural Sciences, Sabaragamuwa University of Sri LankaVerified email at agri.sab.ac.lk
- Reinhard WilhelmComputer Science, Saarland University, Saarland Informatics Campus (SIC)Verified email at cs.uni-saarland.de
- Robin DossDeakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin UniversityVerified email at deakin.edu.au
- Adnan Anwar ; A. Anwar ; A AnwarSenior Lecturer, Course Director (PG Cyber Security Courses), Deakin UniversityVerified email at deakin.edu.au
- Mohamad Rafi Segi RahmatUniversity of Nottingham MalaysiaVerified email at nottingham.edu.my
- Sue Walker ProfUFS & ARCVerified email at arc.agric.za
- Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
- Arkady ZaslavskyDeakin University, Data61 @ CSIRO, Monash University, Lulea University of Technology(Sweden)Verified email at deakin.edu.au
- John-Jules Meyeremeritus Utrecht UniversityVerified email at cs.uu.nl