Crea il mio profilo
Coautori
- Manolya Kavakli-ThorneProfessor of Gamification & Simulation Technology, Aston University, UKEmail verificata su aston.ac.uk
- Iqbal H Sarker, PhDCUET | Swinburne University | Cyber Security CRC | ECU, AustraliaEmail verificata su ecu.edu.au
- Dr. Gulshan KumarAssociate Professor, Shaheed Bhagat Singh State University, FerozepurEmail verificata su ptu.ac.in
- Professor Paul WattersCyberstronomy Pty LtdEmail verificata su cyberstronomy.com
- Shahriar BadshaSr. Security Engineer, General MotorsEmail verificata su gm.com
- A. S. M. KayesSenior Lecturer in Cybersecurity, Dept of CSIT at La Trobe University, MelbourneEmail verificata su latrobe.edu.au
- Dr. Nazim Uddin SheikhResearch Fellow, Macquarie University, SydneyEmail verificata su mq.edu.au
- Syed Md. Minhaz HossainAssistant Professor, Dept of CSE, Premier UniversityEmail verificata su puc.ac.bd
- Dr. Kutub ThakurPhd Computer Science , Pace UniversityEmail verificata su pace.edu
- Sohrab HossainAssistant Professor, Department of Computer Science and Engineering, East Delta UniversityEmail verificata su eastdelta.edu.bd
- Sheikh IkhlaqTechnical Architect Manager at DeloitteEmail verificata su deloitte.com
- Alex Hay-Man Ng (吴希文)Guangdong University of Technology; University of New South WalesEmail verificata su unsw.edu.au
- Asif Irshad KhanEmail verificata su kau.edu.sa
- Kwok Wai LOThe Chinese University of Hong KongEmail verificata su cuhk.edu.hk
Segui
HAMED ALQAHTANI
Assistant Professor @ King Khalid University
Email verificata su kku.edu.sa - Home page