Crea il mio profilo
Accesso pubblico
Visualizza tutto0 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Steven FurnellUniversity of NottinghamEmail verificata su nottingham.ac.uk
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthEmail verificata su plymouth.ac.uk
- Maria PapadakiAssociate Professor in Cyber Security, University of DerbyEmail verificata su derby.ac.uk
- Mohiuddin AhmedSenior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior MemberEmail verificata su ecu.edu.au
- Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKEmail verificata su bournemouth.ac.uk
- James KangEdith Cowan University WA, AustraliaEmail verificata su ecu.edu.au
- Leslie F. SikosEdith Cowan UniversityEmail verificata su ecu.edu.au
- MZ JaliAssociate Professor, Universiti Sains Islam Malaysia (USIM)Email verificata su usim.edu.my
- ZARUL FITRI ZAABAUniversiti Sains MalaysiaEmail verificata su usm.my
- Wencheng YangUniversity of Southern QueenslandEmail verificata su usq.edu.au
- Nickson M. KarieSenior Lecturer-Cybersecurity and Forensics, Curtin University, Australia.Email verificata su curtin.edu.au
- Nor Masri SAHRIUniversity Technology MARA MalaysiaEmail verificata su kyudai.jp
- Burhan Al-bayati.Lecturer, Computer Science Department, College of Science, Diyala University, IraqEmail verificata su sciences.uodiyala.edu.iq
- Bogdan GhitaUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Luigi VezzulliUniversity of GenoaEmail verificata su unige.it
- Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteEmail verificata su met.no
- Najem MahmoudPhD, University of Plymouth, UK.Email verificata su plymouth.ac.uk